Analysis

  • max time kernel
    120s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 05:38

General

  • Target

    ImplementationNewFormat 9.28.2023.xlam

  • Size

    215KB

  • MD5

    18f2cc431bc324eb5acc5eb3575f45db

  • SHA1

    dbcd017504241c1b0d22478e88499cc8d668f866

  • SHA256

    76071800cb9f494eaa26ced55c2f414c7e20eecb1ff450d70e878e691358b459

  • SHA512

    a8ee8abbc9ed12e1f2374c3c92851c9b9876ee126f2fe9be6f3745f1377eecffa56f497ce7313e1e04925cef358cd89135a82e7b20147922931af6c3801264b4

  • SSDEEP

    6144:zWTvGpWxC3IAnPYad3Cg4fzWNPdQrJWmchjSjQi/8PMyKw:CvBxIP7gg4fyPdeDchjSJ80Dw

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\ImplementationNewFormat 9.28.2023.xlam"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2072-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2072-1-0x00000000724DD000-0x00000000724E8000-memory.dmp

          Filesize

          44KB

        • memory/2072-3-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-4-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-5-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-6-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-7-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-8-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-9-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-13-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-12-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-14-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-15-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-16-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-17-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-36-0x00000000724DD000-0x00000000724E8000-memory.dmp

          Filesize

          44KB

        • memory/2072-37-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-39-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-38-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-42-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-43-0x0000000000730000-0x0000000000830000-memory.dmp

          Filesize

          1024KB

        • memory/2072-48-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2072-49-0x00000000724DD000-0x00000000724E8000-memory.dmp

          Filesize

          44KB