Analysis

  • max time kernel
    144s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 01:41

General

  • Target

    2327c4dcf9ac1674ab8981f1b0de51f6.xlsm

  • Size

    26KB

  • MD5

    2327c4dcf9ac1674ab8981f1b0de51f6

  • SHA1

    f3367763f25cd6d27e12bbb66be161c01c946950

  • SHA256

    8c6a279240a33db9b8237d74819c01c4ac793b30f70a505d853fcc73effb3d42

  • SHA512

    505417d3f5f22b2ff9bd598088bd2548af245b7a76ffcffaf8e60a4776b9eb0030e1d1b741b1cf61b2914772f146cab352cf38f7f7cc266dcd2d8f1634aed0b8

  • SSDEEP

    768:P2vsH1CjO/Qvb6c4usyLpR8tjIuoOEUQ4AKb687cHhURaW:P2kH1CjWQjD4/yLpR8tUfQzYBURr

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2327c4dcf9ac1674ab8981f1b0de51f6.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2372

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2372-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2372-1-0x0000000071FAD000-0x0000000071FB8000-memory.dmp

          Filesize

          44KB

        • memory/2372-2-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-3-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-4-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-5-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-6-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-8-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-7-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-9-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-16-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-23-0x0000000071FAD000-0x0000000071FB8000-memory.dmp

          Filesize

          44KB

        • memory/2372-24-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB

        • memory/2372-25-0x0000000000610000-0x0000000000710000-memory.dmp

          Filesize

          1024KB