Analysis

  • max time kernel
    124s
  • max time network
    31s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    11/05/2023, 18:51

General

  • Target

    RetirementPlan.xlsx.xll

  • Size

    541KB

  • MD5

    6e48c62d75c15044b162ca5b2f78747b

  • SHA1

    21e478e7ad791aecefb5e902ab03dd99bc28c2ec

  • SHA256

    601421ad80704fa48cf10d3481751a17ae0a7970f0aa2903978fcfa34d270248

  • SHA512

    fd3e41da4ae08cf999742c3119bc2effc26eecc082e22f314443b8bc63805f37e4e4cdf8b0ab138b66a2b5bb12f474fc8ab0d2fd32b6da43a05c7afa1b7f9c3a

  • SSDEEP

    6144:QaasgQks5F4dTEii6o+GTzzxC46pe9jugAZ/+GhzwM7gbmhzKcgA9K7UMrF7GaTW:QaavtddTi6cz1DoZlsk7cZD1v4ZMH

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\RetirementPlan.xlsx.xll
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1196

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\RetirementPlan.xlsx.xll

    Filesize

    64KB

    MD5

    71134dfc43d3eba798d521d6f5bbeb72

    SHA1

    0d8099063682ea05fc104a377e064d32830322be

    SHA256

    ebb62701ec2c6cd921902df506a71d2d500eed5d83e7d6193224089414fb3baa

    SHA512

    0d1bf4b323d837eb5c5bff13ee441aa3e6dfe44a109eac69b9ff234410b73ff9c090f89b3adf3a883037e6e648a9158b68cc6749ac1ba46b24e2103133ce4043

  • memory/1196-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1196-56-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB