Analysis

  • max time kernel
    124s
  • max time network
    41s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 21:04

General

  • Target

    d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d.xls

  • Size

    56KB

  • MD5

    5f5da55da2ad44b69a12e6279c9393de

  • SHA1

    fa02688bafbd2a73de8951660f8f8c66e17462bc

  • SHA256

    d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d

  • SHA512

    cd41a2882527aab2e69367ef15fad05088004f91226a556724a31068baa15b308c0daa110d7665fff712034f594ae0922daad79a51f648f0fc98be8345848e35

  • SSDEEP

    1536:EUUUUYNsARl9gB2OwHyWMUNm0IZ95mKhlI7N7fa:khMBa

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\d90abe1e6539bf0479edd8f8c3f073dc6f3f39d5edceb43447f5abfce74b446d.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1452
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:1816
  • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:408

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Office\Recent\index.dat
    Filesize

    96B

    MD5

    e025e9b062a85f515203d58c2f222802

    SHA1

    6de1a4cc0cf25175b3d64f4605b7d39576244532

    SHA256

    bf0ae0ea7e2b9b8c689a2fb93d44a8d56efe549ae0882d685628036e92a09245

    SHA512

    111fc117f3f676c79fa9e73c768c78e5e973fa056f00cd65adf69e6bb65707926411cad77aabfbe66f821f87fc63cd7cb65d72a399dc2daca41d0fab0e029909

  • memory/408-65-0x000000006B1C1000-0x000000006B1C4000-memory.dmp
    Filesize

    12KB

  • memory/408-72-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB

  • memory/408-71-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/408-68-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB

  • memory/1452-57-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB

  • memory/1452-59-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB

  • memory/1452-58-0x0000000075041000-0x0000000075043000-memory.dmp
    Filesize

    8KB

  • memory/1452-54-0x000000002F501000-0x000000002F504000-memory.dmp
    Filesize

    12KB

  • memory/1452-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1452-55-0x0000000071501000-0x0000000071503000-memory.dmp
    Filesize

    8KB

  • memory/1452-76-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB

  • memory/1816-63-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB

  • memory/1816-75-0x00000000724ED000-0x00000000724F8000-memory.dmp
    Filesize

    44KB