Analysis

  • max time kernel
    419s
  • max time network
    1143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/08/2023, 15:14

General

  • Target

    Overdue.xlsx

  • Size

    475KB

  • MD5

    e300bb2895d5adae6d17c85c7ed1da64

  • SHA1

    bb8234c1a910b2e4afd93c28b8fbf2c17c83197c

  • SHA256

    06f38d070af48ffa7b7def3f96b6ea85d021576c4dcc2ae549eaebaef7d8a7a7

  • SHA512

    da27ab480c9a1ba67d23b02a6d5cfbcb93b1b0ce1bc2ef68e0baf2c79db677def36355af3fa70bfb959f21c3f8d82d860254852e7ec486bc02e06372adb014c0

  • SSDEEP

    12288:6UfYGp/u70N4ZLWpSVrCJgrecaEYGQGl+TBUh1qcJ0egtg:dQGgFLBG6YEp3uSxJ0egW

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Overdue.xlsx"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3460

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3460-136-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-137-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-139-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-138-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-141-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-142-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-143-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-144-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-145-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-140-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-146-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-147-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-148-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-149-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-150-0x00007FFA33590000-0x00007FFA335A0000-memory.dmp

          Filesize

          64KB

        • memory/3460-151-0x00007FFA33590000-0x00007FFA335A0000-memory.dmp

          Filesize

          64KB

        • memory/3460-154-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-155-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB

        • memory/3460-176-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-177-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-178-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-179-0x00007FFA35A90000-0x00007FFA35AA0000-memory.dmp

          Filesize

          64KB

        • memory/3460-180-0x00007FFA75A10000-0x00007FFA75C05000-memory.dmp

          Filesize

          2.0MB