Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2023, 12:42

General

  • Target

    ORDER INQUIRY.xlam

  • Size

    7KB

  • MD5

    848062ceceb21f27903c951e60067941

  • SHA1

    468ecc4f301e83ae156133e425f4d260bb799abb

  • SHA256

    b73d1ef3c646bc8f5a0fcb7f091fe08b3492b8194194f225d43cc5ad33053f03

  • SHA512

    029249cf7db66280eb30b8745fe560e5ac5ad3306cc1fb0fdec1a0eca54ec9d3deb1b6a5c98e07d1653a9102c315a38d4ef510b424dbda804aaf6e1f00ed9cd4

  • SSDEEP

    192:EBbD+2LCLEOV8vdQjm+Njz2vYuUc5i7hG:wZLod8qmgjz3uUc5H

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\ORDER INQUIRY.xlam"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1928

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1928-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1928-55-0x00000000733AD000-0x00000000733B8000-memory.dmp

    Filesize

    44KB

  • memory/1928-58-0x00000000733AD000-0x00000000733B8000-memory.dmp

    Filesize

    44KB

  • memory/1928-60-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1928-61-0x00000000733AD000-0x00000000733B8000-memory.dmp

    Filesize

    44KB