Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/03/2024, 18:24

General

  • Target

    5a210143230e1f7ce024e958a9dce029dc067c75a40143f5f9e3090ab7443d4f.xlsx

  • Size

    26KB

  • MD5

    c5c5cd01df00466a4e2a0421992e4890

  • SHA1

    460ad43c46188045ca59fb12617af0977572156a

  • SHA256

    5a210143230e1f7ce024e958a9dce029dc067c75a40143f5f9e3090ab7443d4f

  • SHA512

    e6be195c02164775ec5e83774c92edc0a318b7c24f013bb464bf58243bf92d8d11bb9d2894d3aca578368a8a53f1678bf229509cf436d50c25f0113d0e22f229

  • SSDEEP

    768:uqAAqjRkUiE6SfEtHcjztW/hp1r2YOzMplk:uqnCRG2jpW/D1SYOgplk

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\5a210143230e1f7ce024e958a9dce029dc067c75a40143f5f9e3090ab7443d4f.xlsx
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1688

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1688-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1688-1-0x0000000071EED000-0x0000000071EF8000-memory.dmp

          Filesize

          44KB

        • memory/1688-2-0x0000000071EED000-0x0000000071EF8000-memory.dmp

          Filesize

          44KB

        • memory/1688-5-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1688-6-0x0000000071EED000-0x0000000071EF8000-memory.dmp

          Filesize

          44KB