Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    03-06-2024 18:01

General

  • Target

    Device/HarddiskVolume3/Users/HoaWalsh/Downloads/CustomerImportTemplate (2).xlsm

  • Size

    236KB

  • MD5

    721ee6b11f003b2257c5b8966b2a8455

  • SHA1

    5b523abc7b334f82026aa4198846d094ea587b21

  • SHA256

    d46b14fe4f3acb2b0a83e0f9527b2d48794bf71d91889a435cdd6a1091363e84

  • SHA512

    7458037af444507464ed35b62c3646d0c9df2a8c972a252f4ce7a15553bb14cf17825271b3d13393012eef341d64d29a6e934b8c21494671b17c9b4ab033398c

  • SSDEEP

    6144:xIBPDRl4zXaiscnEOTnM1UdwXORYVAnMFFqL:xIBP1l+q2HbjwsYnC

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\HoaWalsh\Downloads\CustomerImportTemplate (2).xlsm"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1284

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1284-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1284-1-0x000000007229D000-0x00000000722A8000-memory.dmp

    Filesize

    44KB

  • memory/1284-4-0x0000000002E70000-0x0000000002F70000-memory.dmp

    Filesize

    1024KB

  • memory/1284-6-0x000000007229D000-0x00000000722A8000-memory.dmp

    Filesize

    44KB

  • memory/1284-7-0x0000000002E70000-0x0000000002F70000-memory.dmp

    Filesize

    1024KB

  • memory/1284-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1284-13-0x000000007229D000-0x00000000722A8000-memory.dmp

    Filesize

    44KB