Analysis

  • max time kernel
    185s
  • max time network
    189s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 05:28

General

  • Target

    Braemar MTM Report.xlsx

  • Size

    6KB

  • MD5

    22121ca9d21e07ef70f608b196725d62

  • SHA1

    2ce61d697ea0224d61da3f6868b60cc31d63d30b

  • SHA256

    5946fef88400d88eb63588f948c449dcc9842cc62c37074980a8369e8c2aa812

  • SHA512

    fb002b175707cf7fa9e7bfa1b2d9f277642bbd0c3d6f5a55d92d0e6fc86a27af03d6a80f943f99ba95e6e2d6e7defcdb23c64b71e7e698f5ef9de8f6e95dc2c4

  • SSDEEP

    192:EyniSNEjnnReETddGKLLD4ZSBV3h3KctjQ00s:ThEjnnR/8iVlp

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Braemar MTM Report.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1424
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4844
    • C:\Program Files\7-Zip\7zG.exe
      "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Braemar MTM Report\" -spe -an -ai#7zMap4315:118:7zEvent26624
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1308

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1424-133-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-134-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-136-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-135-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-137-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-138-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-139-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-140-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-141-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-142-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-143-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-144-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-145-0x00007FFDBB820000-0x00007FFDBB830000-memory.dmp

      Filesize

      64KB

    • memory/1424-146-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-147-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-148-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-149-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-150-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-151-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-153-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-152-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-154-0x00007FFDBB820000-0x00007FFDBB830000-memory.dmp

      Filesize

      64KB

    • memory/1424-157-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-158-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-162-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB

    • memory/1424-172-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-173-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-174-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-175-0x00007FFDBDED0000-0x00007FFDBDEE0000-memory.dmp

      Filesize

      64KB

    • memory/1424-176-0x00007FFDFDE50000-0x00007FFDFE045000-memory.dmp

      Filesize

      2.0MB