Analysis

  • max time kernel
    108s
  • max time network
    35s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    02-04-2023 22:46

General

  • Target

    floridajobs.org_docs_default-source_2015-state-program-reports_py-2014-2015-employer-retention-and-p.xlsm

  • Size

    90KB

  • MD5

    eadd419cb567723cf908e15b3161e7fa

  • SHA1

    5b26dea713182b534e17f335d322ab8379a008de

  • SHA256

    9a53dcaa860e2aa0306a8e359f3e088b21c33aa95bd8efece29b2b8c81094c41

  • SHA512

    b3bcadf32d74cbbff26192b098ef747e423a0c6b0c74d3a08d935795e3d24a97943c874fa9638e1c89e7c2b4cd9a4bb740f37ce141ab6175836981cd4a4f944a

  • SSDEEP

    1536:MrXJE8w41bFoExL/toUOuSyR0iVpUAumZiaTQf8rTXpgXt9BCHGF2892bXb:MrJE8hbxlBSyG2+JmsA2d39s8YbXb

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\floridajobs.org_docs_default-source_2015-state-program-reports_py-2014-2015-employer-retention-and-p.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:324
    • C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE
      "C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 676
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:464
      • C:\Windows\SysWOW64\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 676
        3⤵
          PID:368

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\7221504.cvr
      Filesize

      976B

      MD5

      8d20f0b77878578fd18d9a726e401d6e

      SHA1

      dd72b26d38f0ac7be8df16d76d9503c6c98aec3e

      SHA256

      eee20f8ddc672af25e9dd444ad167aff6aeabb7db1cf8e93633510fa957d0eb0

      SHA512

      4afab797b51133d27cfbdb6adf796ffd254c2a7e1ea1fe57ce971afab6484c651ce8b9a36e8207d40dc94b66d23b5ecd53be80c30e6ca69d83561ef66a8d2adf

    • memory/324-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/368-57-0x0000000000260000-0x0000000000261000-memory.dmp
      Filesize

      4KB