Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    12/03/2024, 10:33

General

  • Target

    c324091873bb61d167851e5304b96ee9.xls

  • Size

    54KB

  • MD5

    c324091873bb61d167851e5304b96ee9

  • SHA1

    311ff7a1da2e3d9cc794e4277fe80cde4c08548c

  • SHA256

    8fa1e9b491ca1c366728a5859c1a27b362fcdec96250c78479be69266d77d545

  • SHA512

    331dedbb2127564ab4fc94dd6d0f63aefc7f90c8c2b360b8653d59e1884a45fb6a6f4ef3956e0110c1052fb0ba0757d6fff1f2f6d40f89802ab71cb2b2331761

  • SSDEEP

    1536:RDDDD7SbP/amOL5niHVUrdMyW33QOtG8x:mH0MyW3Yg

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\c324091873bb61d167851e5304b96ee9.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1336

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\VB9F7C.tmp

          Filesize

          1KB

          MD5

          eba7e2d0a27e1e9219a8a1899a809320

          SHA1

          b118f72db66c528a3ae181b5de70b4fb4dc75825

          SHA256

          6b36f9cca926c41f958d574ad80ad8c51e1a40ffbb0b59307ac2f71c373b960a

          SHA512

          e3a89ec4361cffc1e8f2bc426b2ba6b283b6e44ad314da172d636008c7871d792c222ff5746d7fb57d84ea384fafcd1c59442bd71d3bbda9eeadb6985e592848

        • C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\StartUp.xls

          Filesize

          7KB

          MD5

          633705bdf367a6e85968fe37345a7382

          SHA1

          698b356309bc9b7ef7c2ead431dcc735575def29

          SHA256

          e6b6c47057eadd1be65541ed491362a36b9fda0de2a7d788fb466f60136de850

          SHA512

          ca0a178e0014b0d51252e80c5288ea042ba5ebc58cb2b93dcb9b88f19b19fb921b2e035bb7a10a99b95caf319a6221a07b1003e92bb86900ccefdb08ee8417ac

        • C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\StartUp.xls

          Filesize

          7KB

          MD5

          c7b1ac4d330487d46e71e1c7d3fda9d6

          SHA1

          2cfd99a80a5b570d3ba25835ba3d033a208139b8

          SHA256

          b777b83acc802803a5c6ca087474d2249ab26e87f16edfc8fea3b9eaeaa5b11a

          SHA512

          6dba6387989ce8538386eadb3ed68c23ce677818cf11bc9124661b4aef06288cd21ee0b53376ac2a49c8fc2de663848ffc2378f43b477b8d95d96095be6769c7

        • memory/1336-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1336-1-0x000000007285D000-0x0000000072868000-memory.dmp

          Filesize

          44KB

        • memory/1336-6-0x0000000005F60000-0x0000000006060000-memory.dmp

          Filesize

          1024KB

        • memory/1336-51-0x000000007285D000-0x0000000072868000-memory.dmp

          Filesize

          44KB

        • memory/1336-52-0x0000000005F60000-0x0000000006060000-memory.dmp

          Filesize

          1024KB