Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 09:37

General

  • Target

    2a798623303b498aa94c8c2efa5b2f3bfbd7ca009f84454274a581c8c37ef3fe (2).xls

  • Size

    451KB

  • MD5

    228b52f772aad1001d6baea44535aeec

  • SHA1

    f61cadc0f896ac0ff141a11ee6ccb1c43717975e

  • SHA256

    2a798623303b498aa94c8c2efa5b2f3bfbd7ca009f84454274a581c8c37ef3fe

  • SHA512

    2d334f2ee82c3a1590bf3cbd101114400f5fb111e5d61ed7fab953a4c3c1bb22f84d96b90df3397c8f0afaff90f144400db82a9a21ac9450b81074cc2306f7a1

  • SSDEEP

    6144:5bGb6Wqn+EXuLHpQg4w0PEA1ZvXzmcC+j5uSD1mslXqgrs0LWOo5MlDD:B+2teLHudu2hjbXqgrs0qOqMlDD

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\2a798623303b498aa94c8c2efa5b2f3bfbd7ca009f84454274a581c8c37ef3fe (2).xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /u /s C:\WINDOWS\system32\lyfjjm.dll
      2⤵
      • Process spawned unexpected child process
      PID:2280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2256-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2256-1-0x000000007252D000-0x0000000072538000-memory.dmp

    Filesize

    44KB

  • memory/2256-4-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2256-3-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2256-5-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2256-6-0x000000007252D000-0x0000000072538000-memory.dmp

    Filesize

    44KB

  • memory/2256-7-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2256-9-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2256-8-0x0000000000630000-0x0000000000730000-memory.dmp

    Filesize

    1024KB

  • memory/2256-16-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2256-17-0x000000007252D000-0x0000000072538000-memory.dmp

    Filesize

    44KB