Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 03:25

General

  • Target

    50269b5e8f60e3847888544e68368f3c.xlsm

  • Size

    72KB

  • MD5

    50269b5e8f60e3847888544e68368f3c

  • SHA1

    3b8d2e2087d1936a6dd08013ef1c8a344dbc3515

  • SHA256

    40b5ae97c036d45073b6edfcabbd4f5fe1a577d2e21f57282c09ebe2d32b7492

  • SHA512

    ed2731137742827c315b2447072a40c5e0970b790397a8e43bbb5c94a4739fadd41046965b268ce2a390a9b2d2a95304df461dd8ea890a99d1613b698d3fa747

  • SSDEEP

    1536:RjC5MWvBAnlcy6xQjqbO1pr7TOEgVbcWV6ZPEBUBI8aKLzrGAN:RjLNlctgqCPrfOBlcDCBUBIuLzd

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 32 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\50269b5e8f60e3847888544e68368f3c.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\ProgramData//theArrowHeadWidthMedium.sct
      2⤵
      • Process spawned unexpected child process
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\ProgramData\qMacrosheetCell.dll,AddLookaside
        3⤵
          PID:2612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\theArrowHeadWidthMedium.sct

      Filesize

      11KB

      MD5

      51b13f4b56ba397816961014310ca8a0

      SHA1

      04534df3ed3cf696e4933f0bb1f99cffe4e6d4c5

      SHA256

      dbe391199095cc0b06885c1f5133f1ec23d8cdc48ba9973997b0ffa14ef369ab

      SHA512

      c71817fc6a3b58e7d132445d55530055cb7726b0294a5536b0ce0a42cdd90b756fffb1c2bf41d3b96b5c897b4e1cda68bebcf0686cf4cda62244e895d40719b9

    • memory/2024-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2024-1-0x0000000072CAD000-0x0000000072CB8000-memory.dmp

      Filesize

      44KB

    • memory/2024-3-0x0000000006180000-0x0000000006280000-memory.dmp

      Filesize

      1024KB

    • memory/2024-7-0x0000000072CAD000-0x0000000072CB8000-memory.dmp

      Filesize

      44KB

    • memory/2024-8-0x0000000006180000-0x0000000006280000-memory.dmp

      Filesize

      1024KB

    • memory/2024-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2024-11-0x0000000072CAD000-0x0000000072CB8000-memory.dmp

      Filesize

      44KB