Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/03/2024, 06:23

General

  • Target

    b4028d2e9c1390a2e98fc3d48a054c37.xls

  • Size

    26KB

  • MD5

    b4028d2e9c1390a2e98fc3d48a054c37

  • SHA1

    04d77cf04fd711bf6c5d05306e35524578ddf797

  • SHA256

    36c8f15535d4b84606f6ca85d99d41d9cf2cc078f32a4e3c9403461303cc21de

  • SHA512

    6f331c962f72db1fc3cf2d6b696bc9f7af82b3c668d90e69d56873fc81b41c84645619e06187e971a5a2e226505a65ba90c95af3efcb7da3f4028e485ed0b038

  • SSDEEP

    384:vm6666CDHOfSoR2PYSgENHANpAfuEuzi+LYG2s/XYGIuz0O/CR:vm6666CDHOfSoR2A/KGFz6w1zKR

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\b4028d2e9c1390a2e98fc3d48a054c37.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:2932

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\VB1892.tmp

          Filesize

          1KB

          MD5

          f1b5d31534bce7d254c5003028001797

          SHA1

          577cf0f83d02a664fe4449a7a62395579afbbcf6

          SHA256

          e6a229d514a3aa019ed5f879ca1c27969d09c636d3d703469abe1e71562a732b

          SHA512

          2ae8cfdf87939d562c83d5490a68891297102f4178d510e5d00a64d5afc19ca53326d11e5cd01da581fc6559f1b26e674eb5368c79b45bb9e9d426f62ddb67dc

        • C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\StartUp.xls

          Filesize

          7KB

          MD5

          99e9ffd66a2e5649f217cb1b873b30b2

          SHA1

          7f93ee3aa59a3805935f8f650d7ef4a760326ff4

          SHA256

          4d3ad721710dafade384132e2408486d66c27a13f30c049bf0a45a46f9368672

          SHA512

          e002d485e4c04b428715d4a952005bbadd9c360c7b63397e2fb71b7a9c416d6b96e4b7fa5edcff21cad70c0fc818dc4e9c4b5f2d40da865777ac1d5ca41db92a

        • C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\StartUp.xls

          Filesize

          7KB

          MD5

          ac08ace6d3f43bccf700a36334a71c05

          SHA1

          d6069dc315ad40ee299ae1f3298384f2ed887136

          SHA256

          48be563ddc865be4819e27febbd036d51a870cb5a1e395041cbdde086812f2f0

          SHA512

          5c1e68100933c18c4fea2f672b60428fce604016919aceb557eb1dc160d9df2224450597ce551aaec4af3c7e19e6fde7787a865d26353e2b1c5e0bf0b40612fd

        • memory/2932-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/2932-1-0x000000007236D000-0x0000000072378000-memory.dmp

          Filesize

          44KB

        • memory/2932-6-0x0000000006320000-0x0000000006420000-memory.dmp

          Filesize

          1024KB

        • memory/2932-51-0x000000007236D000-0x0000000072378000-memory.dmp

          Filesize

          44KB

        • memory/2932-52-0x0000000006320000-0x0000000006420000-memory.dmp

          Filesize

          1024KB