Analysis

  • max time kernel
    142s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    08-06-2024 15:13

General

  • Target

    16a5c537528512a1cb6745bb42f02a85112e33e0970caabb93ea839a03012e05.xls

  • Size

    902KB

  • MD5

    ad0f9670a92556bd6be7a6467c9fb5f6

  • SHA1

    99cade3df54169713491edc5c5df4495f45c67ee

  • SHA256

    16a5c537528512a1cb6745bb42f02a85112e33e0970caabb93ea839a03012e05

  • SHA512

    7cf8c044115a664c2fed3d30bf95d119c64955032e5ac88a11c14f8a69f25197831eb61771a517fdd437f6ea7c92a38b004335de57b2ff02037f9c1dbee0588d

  • SSDEEP

    24576:pOga0xf5JmaQramc5LXU3OldOCuvN9Jpt:ZTf5Tz5LXy1l

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\16a5c537528512a1cb6745bb42f02a85112e33e0970caabb93ea839a03012e05.xls
    1⤵
    • Loads dropped DLL
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vds.xlsx

    Filesize

    561KB

    MD5

    082a0a0d64143cab5f1a6151ad46a7e5

    SHA1

    97ecad25aa904aa26cb23cbe6d28ec586fe55476

    SHA256

    3705ef8f9815e9d95d16a57eb7d7bdffc0111df7f8fb87ee878c3b29ae9bbd15

    SHA512

    bedc00459daf854eb9e8158b63721ce24111d6c7f2455d73a1028a05e6bc5fc2d3bc3cc56ffded268003a5f78a2d63146f0ff4ac400911fd4d3fd3c1d631ef4b

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\rtdt.dll

    Filesize

    324KB

    MD5

    f1df801459853f42662c0f947518d3e7

    SHA1

    15e292ab8c863f2ba97244ed3f6cb226980580e9

    SHA256

    b02e02ff9b225ad1d2d295800005675fbf2dacd2899b5b939e1070aa2de623e1

    SHA512

    a06911c0e062dc0d6d8803ea4a0332ea8097839d03f3a382b104e78c82d57685aa199033c582936823115253a65f0883e4d0b76c8988d7319e5bed29f9618d13

  • memory/3000-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3000-1-0x0000000071DFD000-0x0000000071E08000-memory.dmp

    Filesize

    44KB

  • memory/3000-10-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-11-0x0000000007020000-0x0000000007120000-memory.dmp

    Filesize

    1024KB

  • memory/3000-18-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-14-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-15-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-16-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-17-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-54-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-28-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-57-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-56-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-55-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-27-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-26-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-25-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-24-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-23-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-22-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-21-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-20-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-19-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-58-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-59-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-65-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-60-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-70-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-77-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-83-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-87-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-76-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-75-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-74-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-73-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-72-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-71-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-66-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-105-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-168-0x0000000007400000-0x0000000007401000-memory.dmp

    Filesize

    4KB

  • memory/3000-190-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-193-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-195-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-202-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-201-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-205-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-210-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-209-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-208-0x0000000071DFD000-0x0000000071E08000-memory.dmp

    Filesize

    44KB

  • memory/3000-213-0x0000000010000000-0x0000000010052000-memory.dmp

    Filesize

    328KB

  • memory/3000-214-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-215-0x0000000006400000-0x0000000006500000-memory.dmp

    Filesize

    1024KB

  • memory/3000-216-0x00000000006A0000-0x00000000007A0000-memory.dmp

    Filesize

    1024KB

  • memory/3000-218-0x0000000007400000-0x0000000007401000-memory.dmp

    Filesize

    4KB