Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:12

General

  • Target

    eb0b75756287fb3038fbcd2cc4cd261ec83dd8fd0fca3acabb12d4565ba8cddd.xlam

  • Size

    7.9MB

  • MD5

    ad90e16ea4a9fe11525da7669cb4b8ee

  • SHA1

    5889a54eeb9eb49e6410d4b26e9140c5af8c4f47

  • SHA256

    eb0b75756287fb3038fbcd2cc4cd261ec83dd8fd0fca3acabb12d4565ba8cddd

  • SHA512

    11f8b757b8f6f2aa9948524e5d35c157c22c222f31896a4a2406685573efb7fb79833d98e5ce6754e483b6c9796e1a0617da5dc64c894747ee71354adf49cb24

  • SSDEEP

    196608:wTid8Kxg1WpeO1dhIHtciobcve1sI7nvkLFTwMpKLibsOHx9S7HF:qid8KxgSJ1dhQciobcM37nvsTwMpKAva

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\eb0b75756287fb3038fbcd2cc4cd261ec83dd8fd0fca3acabb12d4565ba8cddd.xlam
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2084
    • C:\Users\Admin\Documents\vhcrvdh iobv.scr
      "C:\Users\Admin\Documents\vhcrvdh iobv.scr" "
      2⤵
      • Executes dropped EXE
      PID:2376

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Data2012\EB0B75~1.ZIP

    Filesize

    7.9MB

    MD5

    ad90e16ea4a9fe11525da7669cb4b8ee

    SHA1

    5889a54eeb9eb49e6410d4b26e9140c5af8c4f47

    SHA256

    eb0b75756287fb3038fbcd2cc4cd261ec83dd8fd0fca3acabb12d4565ba8cddd

    SHA512

    11f8b757b8f6f2aa9948524e5d35c157c22c222f31896a4a2406685573efb7fb79833d98e5ce6754e483b6c9796e1a0617da5dc64c894747ee71354adf49cb24

  • C:\Users\Admin\AppData\Data2012\eb0b75756287fb3038fbcd2cc4cd261ec83dd8fd0fca3acabb12d4565ba8cddd.xlam.zip:Zone.Identifier

    Filesize

    26B

    MD5

    fbccf14d504b7b2dbcb5a5bda75bd93b

    SHA1

    d59fc84cdd5217c6cf74785703655f78da6b582b

    SHA256

    eacd09517ce90d34ba562171d15ac40d302f0e691b439f91be1b6406e25f5913

    SHA512

    aa1d2b1ea3c9de3ccadb319d4e3e3276a2f27dd1a5244fe72de2b6f94083dddc762480482c5c2e53f803cd9e3973ddefc68966f974e124307b5043e654443b98

  • C:\Users\Admin\AppData\VHCRVD~1.ZIP

    Filesize

    327KB

    MD5

    b831179225d01fe223005bdd985be098

    SHA1

    56e4ea19a806b57c4e75a84ad190e4e613c25467

    SHA256

    e65f82aa0cd002924eeda67a64104a2c569020a3d92753fd90b129682d51e979

    SHA512

    0547f72b3c326c851f4d7a2e62e70c4ab2e7f71cc87387b2a8b971aec5734e24eda68893e619739f597a00e6b394d86b3c947d297ee0bcdbe501afbe9314a2d6

  • C:\Users\Admin\Downloads\eb0b75756287fb3038fbcd2cc4cd261ec83dd8fd0fca3acabb12d4565ba8cddd.xlam.xlsx

    Filesize

    11KB

    MD5

    4166a122e5eac964ba9f4b22e2881052

    SHA1

    2c0836146efecbae5abefd91e8b450252f1ccb1b

    SHA256

    03472796e5add20b57cc1c9453dc000abb3f258e7cf6db8978c524c9cb7e1a15

    SHA512

    8e67101ce63d64da103e653673835ed2c6c74f60c029c06546ec836e904e6ece1ce51cfb620d34ec626d03410e561ef2a5aab9e06a0371478739b5b84633be84

  • \Users\Admin\Documents\vhcrvdh iobv.scr

    Filesize

    22.4MB

    MD5

    a54c435bdbc17608fa0b8826bbe9936d

    SHA1

    25228d9ec18c346287848268df7ce6c2e6323b97

    SHA256

    99d73d12b2f0aaffeaf53864f446585846632f2635627209422d87679696a2cd

    SHA512

    a7748ff8e19f2df8b07cf013ba1c019fd715df7857f33870da8b75c748f519dc1f1740b7bc070d2dd8b1009c2b727bd7028e2424dbdab3abd42a82cde966aaea

  • memory/2084-377-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-18-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-362-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-371-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-372-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2084-376-0x000000007283D000-0x0000000072848000-memory.dmp

    Filesize

    44KB

  • memory/2084-60-0x00000000061F0000-0x00000000061F1000-memory.dmp

    Filesize

    4KB

  • memory/2084-19-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-1-0x000000007283D000-0x0000000072848000-memory.dmp

    Filesize

    44KB

  • memory/2084-412-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-413-0x00000000061F0000-0x00000000061F1000-memory.dmp

    Filesize

    4KB

  • memory/2084-414-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2084-419-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2084-420-0x000000007283D000-0x0000000072848000-memory.dmp

    Filesize

    44KB