Analysis

  • max time kernel
    237s
  • max time network
    333s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25/11/2022, 19:33

General

  • Target

    10775cedb9f39893f3961a7eb392bdbd79dcb1a536f598395df2370638879685.xls

  • Size

    35KB

  • MD5

    78ecedb5e3c78de257892b42f9ffeab4

  • SHA1

    d4b798da21a3ae0a793f2b56755ee4b9c782bb16

  • SHA256

    10775cedb9f39893f3961a7eb392bdbd79dcb1a536f598395df2370638879685

  • SHA512

    d17955b4109311b246a85433af3d5e7666ce6f610ba220e3275a81429a2526b77e1bddd39a5f7a1343faf8d28dc7aff64543ca84f069f4e3200630b2027018d7

  • SSDEEP

    768:W5rHvT2+zBUSY/ciaHWjAJIroR9MZa9n/:W5rlY0iaHWjAJIroR9MZa9/

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\10775cedb9f39893f3961a7eb392bdbd79dcb1a536f598395df2370638879685.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:268

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/268-54-0x000000002FB71000-0x000000002FB74000-memory.dmp

          Filesize

          12KB

        • memory/268-55-0x00000000718A1000-0x00000000718A3000-memory.dmp

          Filesize

          8KB

        • memory/268-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/268-57-0x000000007288D000-0x0000000072898000-memory.dmp

          Filesize

          44KB

        • memory/268-58-0x0000000076931000-0x0000000076933000-memory.dmp

          Filesize

          8KB

        • memory/268-59-0x000000007288D000-0x0000000072898000-memory.dmp

          Filesize

          44KB

        • memory/268-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/268-61-0x000000007288D000-0x0000000072898000-memory.dmp

          Filesize

          44KB