Analysis

  • max time kernel
    124s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-04-2024 13:10

General

  • Target

    overview.xlsm

  • Size

    66KB

  • MD5

    9f8b33bf47ab27233a403c51cc4f506b

  • SHA1

    b6965e1a8ef10e5a71462ae8f831a217910229a1

  • SHA256

    533b5186f54d047afab38b37301a56cc599f06d36ccca275455bb565db64acf7

  • SHA512

    914401533acf1af8b4c895e2c686c80485491a5ec9e5f052113a5f29b7b9a602e338c44cce81c325549ac320e47ad7bdc4959097b4fba903d4b4d7719977e86b

  • SSDEEP

    1536:MZXMDD65mVpxdRExYSL02uHtQLEaDOo9JU1O2u9ffUomG8i52caNOzG2:pomtib

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\overview.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1548

Network

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{34008B68-4520-42AA-8C01-3A46EF7ABF11}.FSD
    Filesize

    128KB

    MD5

    cfc589d86f451ac5a21a13b46519070c

    SHA1

    ddf3020e1b0bc921aeb6fbff463744aaaf47245d

    SHA256

    a576feb6e05e12bb9b27152a502f57e32b58ff248d85683080e3dd92d9605b67

    SHA512

    986c49f5ceb36e08d805db040e6dde84f44aefc27d5de568a48cf6e1087358c2d4db2444d174c6b4e4183d9076894c088c820aee42d55cd2323cf08902c8f906

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD
    Filesize

    128KB

    MD5

    bb34f6ea501ab94c45fe18b8c8e0297b

    SHA1

    38a7c77dcb1728283f9943dee633fef625e6a7b0

    SHA256

    ff2d6e3df8f92f4fa1621cd762badee658fad26aa44f2c8aeb45fb504f6ed97f

    SHA512

    b2afb608a585ecd31511b674de083e9e42c415dec841f513b926e6743fc2f5491abf8cb32e100c99e8cbd4649ce5ed214fab9555eec1cad0e1a151ada95ef79f

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{70B1A17D-55B4-4AC8-A085-F494F0C35843}.FSD
    Filesize

    128KB

    MD5

    f7fb5e42158baf6f23d9221ea46c97e3

    SHA1

    f1fcf28d21faed9f1e497062a4ac5deee479140a

    SHA256

    6400fff908c2312c02cecdc136271524ba58312d486ca6d442249d20bde70abe

    SHA512

    21429a2e368d4433ff676bf5cbad229b5ac60aacd65c00914cfbd4439472203cf1791c864e544b8c46b3611ad0e0c30990de588052a649ffd8be6c8d1d74d55c

  • C:\Users\Admin\AppData\Local\Temp\{F4980158-44DD-4234-9240-9E5995D7CDBE}
    Filesize

    128KB

    MD5

    b2b82b5ff180eb67824a17214150cefe

    SHA1

    b70a7b8f7c0b8e77a247bc652e3da6c3f4d7cc05

    SHA256

    3e77ccfa4760075179c0b9086cb7332b143bf22d796a0c7638b01a392779a7d1

    SHA512

    c30ba0b64c6ca823933eb5e94f0798dd9810806fdd784742160f249a63222628dd98618b0c817584d826d6868bd439738bb8370481700fb1d27959f33c59879f

  • memory/1548-0-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1548-1-0x0000000072A9D000-0x0000000072AA8000-memory.dmp
    Filesize

    44KB

  • memory/1548-2-0x0000000000430000-0x0000000000530000-memory.dmp
    Filesize

    1024KB

  • memory/1548-4-0x0000000000430000-0x0000000000530000-memory.dmp
    Filesize

    1024KB

  • memory/1548-3-0x0000000000430000-0x0000000000530000-memory.dmp
    Filesize

    1024KB

  • memory/1548-68-0x0000000072A9D000-0x0000000072AA8000-memory.dmp
    Filesize

    44KB

  • memory/1548-69-0x0000000000430000-0x0000000000530000-memory.dmp
    Filesize

    1024KB