Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    25/12/2023, 01:05

General

  • Target

    1f196d875fd7d89ac57831926bbb9563.xlsm

  • Size

    334KB

  • MD5

    1f196d875fd7d89ac57831926bbb9563

  • SHA1

    3ed1e676f334ab3f82d3a056dad079f85458bfb4

  • SHA256

    081618f7d9c6c92271f8d6bc65c8e13f33dfe9e5022f06aaec95664ee31fead4

  • SHA512

    299011aff7cf8e9d2c2b74f0ffa64ea733516fb22f4aeed0400c5e3da9f548199024ce7317d849c4af27c3c9de95bc947eaa3f3ffc0e211d94cf60ec4c71f7b2

  • SSDEEP

    6144:2Lj+sWRo6tcJhv7Bzg+8h6F493OzNStilzFHVGYT7I3e2:2v+Zenzdl8OLzNSt0RzU3e2

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1f196d875fd7d89ac57831926bbb9563.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\ProgramData//theExcel2FarEast.sct
      2⤵
      • Process spawned unexpected child process
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\ProgramData\qRangeAutoFormatReport3.dll,AddLookaside
        3⤵
          PID:2744

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\theExcel2FarEast.sct

      Filesize

      11KB

      MD5

      d502793876b466c8d509f07f69dd6647

      SHA1

      b4e10b05725012686f5ae04df9c29df280d8687c

      SHA256

      17fa31bbdfae8ac22fca19c90c18e0a97e50400f889bdc73d1fa940d16a791f5

      SHA512

      d135b0528e4e32f8a4b9508078385a1c2e95b8068d3dc771c0a5a51942278624ee9d0f730e77d3684c103ce422ebf923e9bfb62152e7c48db06251ec06a79856

    • memory/1888-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1888-1-0x000000007283D000-0x0000000072848000-memory.dmp

      Filesize

      44KB

    • memory/1888-3-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/1888-7-0x000000007283D000-0x0000000072848000-memory.dmp

      Filesize

      44KB

    • memory/1888-8-0x0000000005B70000-0x0000000005C70000-memory.dmp

      Filesize

      1024KB

    • memory/1888-11-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1888-12-0x000000007283D000-0x0000000072848000-memory.dmp

      Filesize

      44KB