Resubmissions

20/09/2023, 00:56

230920-bany4sda2x 1

20/09/2023, 00:32

230920-avwn1seg95 7

Analysis

  • max time kernel
    377s
  • max time network
    363s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    20/09/2023, 00:32

General

  • Target

    db6d4c188888441511d012e793cfbe9df8ae17eb.xls

  • Size

    80KB

  • MD5

    6a2c1c1a82378a685dae9f8a1d7a29e1

  • SHA1

    db6d4c188888441511d012e793cfbe9df8ae17eb

  • SHA256

    0c2dc9c384e251b4fd4e18c8f779ca837fb327fcf1337d10d2f2cd44480c322c

  • SHA512

    113866d705919ffb9a85347d8683cde88582d2b6e444d213435bd7e311e00f25cc32c944c792e50a86229be07c30b20976f24738c8a12d45851d216ff0604dad

  • SSDEEP

    1536:gp8ihwl2rqX1JD9V21KcUuwRV5p5iKBjEPh:gp16ZDD21KcUuwRV5p5icjYh

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\db6d4c188888441511d012e793cfbe9df8ae17eb.xls
    1⤵
    • Deletes itself
    • Drops desktop.ini file(s)
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2304

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/3040-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/3040-1-0x0000000071DDD000-0x0000000071DE8000-memory.dmp

            Filesize

            44KB

          • memory/3040-2-0x0000000071DDD000-0x0000000071DE8000-memory.dmp

            Filesize

            44KB