Analysis

  • max time kernel
    131s
  • max time network
    45s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2022 02:57

General

  • Target

    ʳó豸--Ϸ/ͬļ--豸/.xls

  • Size

    96KB

  • MD5

    2cccc0961e103aa986602a279d6242e8

  • SHA1

    7c3d3a1d5d7f84baaf83068fcf6075c0cc675510

  • SHA256

    08b2447843c17b0a208a21947b331dffcee0baa9bd0d5d859b76a9cf0c432392

  • SHA512

    04cad608a49dccdc527bc8ca594f92441c42cf10dd56ab1365836bbe71367d28cd662a05b636bbee0b303138245dfbe01d12eeee19668f990da77cbae0b61414

  • SSDEEP

    3072:Jd1gxv7yZmspH7+cclKisPI4ukoRWGN6WVbrzQ7ITkFIBAww33XjUJtXwm:X1gxv7yZmspH7+cclKisPI4ukoRWGNc+

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ʳó豸--Ϸ\ͬļ--豸\.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1220

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1220-54-0x000000002FD31000-0x000000002FD34000-memory.dmp
    Filesize

    12KB

  • memory/1220-55-0x0000000070DD1000-0x0000000070DD3000-memory.dmp
    Filesize

    8KB

  • memory/1220-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1220-57-0x0000000071DBD000-0x0000000071DC8000-memory.dmp
    Filesize

    44KB

  • memory/1220-58-0x0000000071DBD000-0x0000000071DC8000-memory.dmp
    Filesize

    44KB

  • memory/1220-59-0x0000000074D81000-0x0000000074D83000-memory.dmp
    Filesize

    8KB

  • memory/1220-60-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1220-61-0x0000000071DBD000-0x0000000071DC8000-memory.dmp
    Filesize

    44KB