Analysis

  • max time kernel
    179s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 22:24

General

  • Target

    322cd3af7fc3586a4711ac5ac36e8b988f56c8abb4fe183b810bfcf80a0a6a58.exe

  • Size

    674KB

  • MD5

    372f433a1c78ee0060fb3a0718ecb4bc

  • SHA1

    ba63c36fc195e5fc91688f963f01e842853516fe

  • SHA256

    322cd3af7fc3586a4711ac5ac36e8b988f56c8abb4fe183b810bfcf80a0a6a58

  • SHA512

    ecd13d97edf6a5cd239620648d1ca5528ffcc14565a698594b0ef179326f8658fa4204be8ef5c5451a3f4ce56380a7cca591c14649c0b18ac18b607bb76b87e8

  • SSDEEP

    12288:rkMIese06snjBQ+H7Ab/rGIkQos6qcJWe8RI6srnycVP/9M:kTnjB1HQ/rGIkQJLcJiRIl7y6P/9M

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\322cd3af7fc3586a4711ac5ac36e8b988f56c8abb4fe183b810bfcf80a0a6a58.exe
    "C:\Users\Admin\AppData\Local\Temp\322cd3af7fc3586a4711ac5ac36e8b988f56c8abb4fe183b810bfcf80a0a6a58.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1720
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:588

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\D598.tmp
    Filesize

    642KB

    MD5

    b3290fa196728bb1dea18d009fa47c39

    SHA1

    4cd46f8e0492383d6f9f2ae586f8eaed16f6e015

    SHA256

    4fe9a2db3a9ddd56d57e0e9b99f21f3dd5d53a9901393e72c01c5939d169738b

    SHA512

    342522622d1f74f07150e3f6bf6c86b8a351c3c5b5e011f298e0e050537ae5209804c7b04e812d57b7516298b908c0089c1228970a1bdad07100df7bbfe99b9e

  • memory/588-56-0x000000002FC01000-0x000000002FC04000-memory.dmp
    Filesize

    12KB

  • memory/588-57-0x0000000071781000-0x0000000071783000-memory.dmp
    Filesize

    8KB

  • memory/588-58-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/588-59-0x00000000763D1000-0x00000000763D3000-memory.dmp
    Filesize

    8KB

  • memory/588-61-0x000000007276D000-0x0000000072778000-memory.dmp
    Filesize

    44KB