Resubmissions

15-04-2024 17:10

240415-vpz5gabf35 1

15-04-2024 17:09

240415-vn3tzabe93 1

Analysis

  • max time kernel
    27s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-04-2024 17:10

General

  • Target

    Trusted Root Certification Authorities/GlobalSign Code Signing Root R45.cer

  • Size

    1KB

  • MD5

    e94fb54871208c00df70f708ac47085b

  • SHA1

    4efc31460c619ecae59c1bce2c008036d94c84b8

  • SHA256

    7b9d553e1c92cb6e8803e137f4f287d4363757f5d44b37d52f9fca22fb97df86

  • SHA512

    2e15b76e16264abb9f5ef417752a1cbb75f29c11f96ac7d73793172bd0864db65f2d2b7be0f16bbbe686068f0c368815525f1e39db5a0d6ca3ab18be6923b898

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    C:\Windows\system32\rundll32.exe cryptext.dll,CryptExtOpenCER "C:\Users\Admin\AppData\Local\Temp\Trusted Root Certification Authorities\GlobalSign Code Signing Root R45.cer"
    1⤵
      PID:3024
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\ResetGrant.xla"
      1⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2680

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2680-0-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp
      Filesize

      64KB

    • memory/2680-1-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp
      Filesize

      64KB

    • memory/2680-2-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-4-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-3-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp
      Filesize

      64KB

    • memory/2680-6-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-5-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp
      Filesize

      64KB

    • memory/2680-7-0x00007FF8D96F0000-0x00007FF8D9700000-memory.dmp
      Filesize

      64KB

    • memory/2680-8-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-9-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-10-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-11-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-12-0x00007FF8D73B0000-0x00007FF8D73C0000-memory.dmp
      Filesize

      64KB

    • memory/2680-13-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-14-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-15-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-16-0x00007FF919670000-0x00007FF919865000-memory.dmp
      Filesize

      2.0MB

    • memory/2680-17-0x00007FF8D73B0000-0x00007FF8D73C0000-memory.dmp
      Filesize

      64KB