Analysis

  • max time kernel
    141s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 19:25

General

  • Target

    资料/12月、1月预订单退货率分析/南京中央.xls

  • Size

    32KB

  • MD5

    29665c97fc5aab79f4620e371e5979f9

  • SHA1

    74f8d134bfde0cfaed289d7be664b33a2353b896

  • SHA256

    be1483ad965ffc7c8b3d6eb8f838e376feb942eea83ae538f5357446b832f043

  • SHA512

    6b354f25d363e13e5a241163650d39bba77fff52e22156a7fe1dd18f94d6f12bbd1c5d951f8be9396810e475327dc13a062b4fbcf057dd55d8a857ac081794f7

  • SSDEEP

    768:QGGGkr1HrTCi9SGxRICqzdR2WKl6Nc7yRzs1H75wkZUiEfClsCq6NqTBun5oEPUa:QGGGkr1HrTCi9SGxRICqzHKl6Nc7yRzk

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\资料\12月、1月预订单退货率分析\南京中央.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1368

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1368-54-0x000000002F0E1000-0x000000002F0E4000-memory.dmp
    Filesize

    12KB

  • memory/1368-55-0x00000000710F1000-0x00000000710F3000-memory.dmp
    Filesize

    8KB

  • memory/1368-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1368-57-0x00000000720DD000-0x00000000720E8000-memory.dmp
    Filesize

    44KB

  • memory/1368-58-0x0000000075C51000-0x0000000075C53000-memory.dmp
    Filesize

    8KB

  • memory/1368-59-0x00000000720DD000-0x00000000720E8000-memory.dmp
    Filesize

    44KB

  • memory/1368-60-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1368-61-0x00000000720DD000-0x00000000720E8000-memory.dmp
    Filesize

    44KB