Analysis
-
max time kernel
181s -
max time network
31s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 02:53
Behavioral task
behavioral1
Sample
3c37501e4a4d37feb582ac44f3a4de129794238eb8cb1fe3743831028570c4b7.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3c37501e4a4d37feb582ac44f3a4de129794238eb8cb1fe3743831028570c4b7.xls
Resource
win10v2004-20221111-en
General
-
Target
3c37501e4a4d37feb582ac44f3a4de129794238eb8cb1fe3743831028570c4b7.xls
-
Size
164KB
-
MD5
07024a1929b69d53fca7e095b6fa5332
-
SHA1
d733ea5977570ba08956bbce3b9aacff1e65f2a2
-
SHA256
3c37501e4a4d37feb582ac44f3a4de129794238eb8cb1fe3743831028570c4b7
-
SHA512
dacb55482509c40ab08803e3422113d4fa451e267c00f8896b7028f4b5fb44570107764d549e568ed5e2a3d489fc33b5d5a98f16190f632d1fa1dd1ac6cbecd1
-
SSDEEP
3072:ZXng+GfjgyRL3s1xHFn2GFmofafT5XV+CKhd/S:mjxkxlnjjQ
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 956 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
EXCEL.EXEpid process 956 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 956 EXCEL.EXE 956 EXCEL.EXE 956 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\3c37501e4a4d37feb582ac44f3a4de129794238eb8cb1fe3743831028570c4b7.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/956-54-0x000000002F941000-0x000000002F944000-memory.dmpFilesize
12KB
-
memory/956-55-0x0000000070FD1000-0x0000000070FD3000-memory.dmpFilesize
8KB
-
memory/956-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/956-57-0x0000000071FBD000-0x0000000071FC8000-memory.dmpFilesize
44KB
-
memory/956-58-0x0000000074DE1000-0x0000000074DE3000-memory.dmpFilesize
8KB
-
memory/956-59-0x000000006C701000-0x000000006C703000-memory.dmpFilesize
8KB
-
memory/956-60-0x0000000071FBD000-0x0000000071FC8000-memory.dmpFilesize
44KB