Analysis

  • max time kernel
    144s
  • max time network
    34s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2023, 18:51

General

  • Target

    RetirementPlan.xlsx.exe.xll

  • Size

    541KB

  • MD5

    6e48c62d75c15044b162ca5b2f78747b

  • SHA1

    21e478e7ad791aecefb5e902ab03dd99bc28c2ec

  • SHA256

    601421ad80704fa48cf10d3481751a17ae0a7970f0aa2903978fcfa34d270248

  • SHA512

    fd3e41da4ae08cf999742c3119bc2effc26eecc082e22f314443b8bc63805f37e4e4cdf8b0ab138b66a2b5bb12f474fc8ab0d2fd32b6da43a05c7afa1b7f9c3a

  • SSDEEP

    6144:QaasgQks5F4dTEii6o+GTzzxC46pe9jugAZ/+GhzwM7gbmhzKcgA9K7UMrF7GaTW:QaavtddTi6cz1DoZlsk7cZD1v4ZMH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\RetirementPlan.xlsx.exe.xll
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2000

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RetirementPlan.xlsx.exe.xll

    Filesize

    128KB

    MD5

    9338cae66092eb5a2ec227d04148aca8

    SHA1

    0df449f8ced596a788838bec31545ac5a9be51d7

    SHA256

    a8f375fdd25787a32d3ddc0bb40a17ec515dbd941ac9e302d92128e849c2a443

    SHA512

    7c323078753d0d9937f5109dd429316b3ce4a7e2d6496329f2f2a48b480f0e726f859cf340126a3cd163b877d2578bafb0722a83777bb16455e929dc10cb7de9

  • memory/2000-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2000-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB