Analysis

  • max time kernel
    91s
  • max time network
    217s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 08:11

General

  • Target

    2_202211210300552831.xls

  • Size

    73KB

  • MD5

    53574a38d5ad6e8a14ff564e41fea773

  • SHA1

    1017e41edb2f6acd55fe5c8fd30346bc833ec599

  • SHA256

    4a298933ab9ce59ff51a5a7bcb0e38047e7d3bcdf98eb29c1bcb77e401286319

  • SHA512

    2ad8e2ae4879305fac8197ac691c40565c89ac498d25c9ea14a3b11b7399a823cc65359d7e03fba411673b82a92c00514624a1c6f05d142aa3c1a5e2c3b1a9b0

  • SSDEEP

    1536:YblYkEIbSkKBEqEXPgsRZmbaoFhZhR0cixIHm0QS5iCGK97gdXaHVk8gASsacQ0i:YblYkEIuPm3fNRZmbaoFhZhR0cixIHmb

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2_202211210300552831.xls
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\Documents\calc.exe
      C:\Users\Admin\Documents\calc.exe -s C:\Users\Admin\Documents\6636702.
      2⤵
      • Executes dropped EXE
      PID:1152
    • C:\Users\Admin\Documents\calc.exe
      C:\Users\Admin\Documents\calc.exe -s C:\Users\Admin\Documents\5074049.
      2⤵
      • Executes dropped EXE
      PID:1156

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\calc.exe
    Filesize

    14KB

    MD5

    432be6cf7311062633459eef6b242fb5

    SHA1

    a774a816662ff5b75669aa5bce751bab9d0972b8

    SHA256

    890c1734ed1ef6b2422a9b21d6205cf91e014add8a7f41aa5a294fcf60631a7b

    SHA512

    02dace1d807e9f2a6034688ff8950bb156ff36ea4eacbf5af8bcc8011106904e1810e26e4c12a20120640ae0c4acaa56372d956f16d037838b8d7dcc921cfa05

  • C:\Users\Admin\Documents\calc.exe
    Filesize

    14KB

    MD5

    432be6cf7311062633459eef6b242fb5

    SHA1

    a774a816662ff5b75669aa5bce751bab9d0972b8

    SHA256

    890c1734ed1ef6b2422a9b21d6205cf91e014add8a7f41aa5a294fcf60631a7b

    SHA512

    02dace1d807e9f2a6034688ff8950bb156ff36ea4eacbf5af8bcc8011106904e1810e26e4c12a20120640ae0c4acaa56372d956f16d037838b8d7dcc921cfa05

  • \Users\Admin\Documents\calc.exe
    Filesize

    14KB

    MD5

    432be6cf7311062633459eef6b242fb5

    SHA1

    a774a816662ff5b75669aa5bce751bab9d0972b8

    SHA256

    890c1734ed1ef6b2422a9b21d6205cf91e014add8a7f41aa5a294fcf60631a7b

    SHA512

    02dace1d807e9f2a6034688ff8950bb156ff36ea4eacbf5af8bcc8011106904e1810e26e4c12a20120640ae0c4acaa56372d956f16d037838b8d7dcc921cfa05

  • \Users\Admin\Documents\calc.exe
    Filesize

    14KB

    MD5

    432be6cf7311062633459eef6b242fb5

    SHA1

    a774a816662ff5b75669aa5bce751bab9d0972b8

    SHA256

    890c1734ed1ef6b2422a9b21d6205cf91e014add8a7f41aa5a294fcf60631a7b

    SHA512

    02dace1d807e9f2a6034688ff8950bb156ff36ea4eacbf5af8bcc8011106904e1810e26e4c12a20120640ae0c4acaa56372d956f16d037838b8d7dcc921cfa05

  • memory/1060-54-0x000000002F3D1000-0x000000002F3D4000-memory.dmp
    Filesize

    12KB

  • memory/1060-55-0x0000000071CD1000-0x0000000071CD3000-memory.dmp
    Filesize

    8KB

  • memory/1060-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1060-57-0x0000000072CBD000-0x0000000072CC8000-memory.dmp
    Filesize

    44KB

  • memory/1060-58-0x0000000076831000-0x0000000076833000-memory.dmp
    Filesize

    8KB

  • memory/1060-59-0x0000000072CBD000-0x0000000072CC8000-memory.dmp
    Filesize

    44KB

  • memory/1152-61-0x0000000000000000-mapping.dmp
  • memory/1156-64-0x0000000000000000-mapping.dmp