Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    12-03-2024 09:57

General

  • Target

    66c33502b2a5831d2f9a4b6ad370ed97ee2a511186495dee2c764d2d84f4f7fe.xlsm

  • Size

    1.6MB

  • MD5

    cede7ce7ac89dbdc3f2261dbf810d111

  • SHA1

    8ff874050eec8ef1e48ec0837f20657d134eb738

  • SHA256

    66c33502b2a5831d2f9a4b6ad370ed97ee2a511186495dee2c764d2d84f4f7fe

  • SHA512

    3ede215133988236f6e8ff9b8823c41ef71a478455cefaa07fcd65c78fca6c7765beffa81ba3e2b77a7a18945b4a2097e28cb14a6db5aba51e0d65dea344e0f2

  • SSDEEP

    49152:svWYRPOLgz0exNCU3AqBAy5rzbHRMyRkz76DeNsamw1:2DzhxNdWy5r3HRo

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\66c33502b2a5831d2f9a4b6ad370ed97ee2a511186495dee2c764d2d84f4f7fe.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\33448F0C.emf

    Filesize

    1KB

    MD5

    3a02beffede27ef9761f20fc8fded3ea

    SHA1

    d07f0733e3bc8a81c67fc7af96ccfa5e93363f24

    SHA256

    97227050c3632fe5fe7d62d4b0965ea7c8439d2c5344e3c436d898cf1e4a2aef

    SHA512

    c979debf576a72023141c2de09998c625e76d445e19bd1dbbcf7afef4688782391d3dfe4a22e2c7bbf7c9a255eed212e00cf9832cf288c9106d9d3088a4315cb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\E3A60B9D.emf

    Filesize

    1KB

    MD5

    30eef36fd0d74429580b6da23d42ea94

    SHA1

    59503369154ece6053024d00573692111016821f

    SHA256

    b57b29695ce93dc8d276a15d8485c853af476062baaffc8684d3f8c01fb28fd2

    SHA512

    47ca90afff193922ea485e03401058b4d18bb0c80e296585bd84b5a29ca656e81bc3ea85f2ed48f66b0ab4859f2ed9f5e0c37c4f43159b6e64cb44f9b7a0db04

  • memory/2912-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2912-1-0x000000007299D000-0x00000000729A8000-memory.dmp

    Filesize

    44KB

  • memory/2912-68-0x0000000007E20000-0x0000000007F20000-memory.dmp

    Filesize

    1024KB

  • memory/2912-77-0x000000007299D000-0x00000000729A8000-memory.dmp

    Filesize

    44KB

  • memory/2912-78-0x0000000007E20000-0x0000000007F20000-memory.dmp

    Filesize

    1024KB