Analysis

  • max time kernel
    144s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240611-en
  • resource tags

    arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system
  • submitted
    01/07/2024, 08:48

General

  • Target

    2d480c7b696975ed15cabc3709953ff3368ac88cdfcf66abd1841b1e8adbdceb.xls

  • Size

    1.0MB

  • MD5

    63760af351082918409ffc944c578d54

  • SHA1

    387e2068e4f078c4cfe80e85bb75043b17f3515d

  • SHA256

    4484620ab09b7d0455660a733191472a2e467e80b2419412c91719d1bbefdfe4

  • SHA512

    7a7d88bf7da42dd3a79d65a8319b56de7b85c2ce4935d63b929a0fc854d8164f5012995ffc1193392522f65b324088f1c7aed3963254b6611a6f9cfcede59f5f

  • SSDEEP

    12288:6CMdFhqCSBFbYJ3Kev5ZGbJMo4iP9HA8BuXvKBfFUl9v1RQ3l16WGLkqY4wVRWEO:9Mp+7YJ3KcQ5IiBurvHQVoWGg9w

Score
1/10

Malware Config

Signatures

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2d480c7b696975ed15cabc3709953ff3368ac88cdfcf66abd1841b1e8adbdceb.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6B2043001D270792DFFD725518EAFE2C

    Filesize

    579B

    MD5

    f55da450a5fb287e1e0f0dcc965756ca

    SHA1

    7e04de896a3e666d00e687d33ffad93be83d349e

    SHA256

    31ad6648f8104138c738f39ea4320133393e3a18cc02296ef97c2ac9ef6731d0

    SHA512

    19bd9a319dfdaad7c13a6b085e51c67c0f9cb1eb4babc4c2b5cdf921c13002ca324e62dfa05f344e340d0d100aa4d6fac0683552162ccc7c0321a8d146da0630

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6B2043001D270792DFFD725518EAFE2C

    Filesize

    252B

    MD5

    6371b657800d495919bf5d0d76a9825e

    SHA1

    1d7ff7c944dd96e2685e57f686f50813b64be98b

    SHA256

    a1729b5f308b4bee391617d6e4333b572e9d616dc036ee3940125bc93a1cbe29

    SHA512

    58dfb0d852e769e90c8bd7de6bd1cbbf324995c94aa06c8f245f80417c0f44335a20f29a6d89267eaf1c0c36ebe5fdd8de021ec10f89823709070a9f469c0998

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\FSD-{8504C7B4-F795-4261-A4F3-B5174602DCB7}.FSD

    Filesize

    128KB

    MD5

    183f8a979e21ea0512934bc1368fcaac

    SHA1

    a022d20a058a0b41da7d4803a72a7980860b0ca3

    SHA256

    a198065b57fb66052434e85269a99c03fae13e3ec6cbc40b680c764c072cc35f

    SHA512

    c3ff2b4b04ba2542d7aacaa4a800aeb040979c86c5a7582726b8bb2723c46b0e3aae7e076a90851ca869b0ade70b5f45e2138d8d6704a7bbeef45617c5cb89d4

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-CNRY.FSD

    Filesize

    128KB

    MD5

    88ff7ec22edaf00e0ef186d92dbeae63

    SHA1

    6b5c427ae68d0b558f8062576cddc7867013d38c

    SHA256

    87b5e7a7e4b4a3d853e22f6c64c03e9354bb08f9c5518e5b9553972766a4d080

    SHA512

    7288ee42bef8f0c1cb03b26e17075384220258b50f5be937be89e87bfa9b6b7ef9c5dcdfc50b284bdf1d992581b19d60f650d226e49ffdc08d13abbd2a2a6e21

  • C:\Users\Admin\AppData\Local\Microsoft\Office\14.0\OfficeFileCache\LocalCacheFileEditManager\FSD-{69F54BBE-4CAC-40D6-B173-91D70CB98368}.FSD

    Filesize

    128KB

    MD5

    4c3fd3849a6e081fd6d968b3c295ac5e

    SHA1

    b11c8d24dd95fdd10700e1f560df5f4d04e3100d

    SHA256

    95385161008c0cacaf6a106849c5b8f9f79fbd781c8a6ab15f7dd027516627a9

    SHA512

    31c07447bdc2d540425285ed6cc545d48e38b8e00426143811bed61d5be63ac2f1709c1369371153c1578206564b1097aa67cf8c8dee92f60276804824ea482d

  • C:\Users\Admin\AppData\Local\Temp\Cab20CD.tmp

    Filesize

    67KB

    MD5

    2d3dcf90f6c99f47e7593ea250c9e749

    SHA1

    51be82be4a272669983313565b4940d4b1385237

    SHA256

    8714e7be9f9b6de26673d9d09bd4c9f41b1b27ae10b1d56a7ad83abd7430ebd4

    SHA512

    9c11dd7d448ffebe2167acde37be77d42175edacf5aaf6fb31d3bdfe6bb1f63f5fdbc9a0a2125ed9d5ce0529b6b548818c8021532e1ea6b324717cc9bec0aaa5

  • C:\Users\Admin\AppData\Local\Temp\Tar21CD.tmp

    Filesize

    160KB

    MD5

    7186ad693b8ad9444401bd9bcd2217c2

    SHA1

    5c28ca10a650f6026b0df4737078fa4197f3bac1

    SHA256

    9a71fa0cb44aa51412b16a0bf83a275977ba4e807d022f78364338b99b3a3eed

    SHA512

    135be0e6370fd057762c56149526f46bf6a62fb65ef5b3b26ae01fa07b4c4e37188e203bd3812f31e260ec5cccff5924633dd55ab17e9fa106479783c2fb212b

  • C:\Users\Admin\AppData\Local\Temp\{367BD84F-BC1B-4F4D-ACB6-AB08671D8029}

    Filesize

    128KB

    MD5

    c26196b2c48cf63472e043bddb45afc0

    SHA1

    cdb988118a2e169670840e00b5e0ab7a21be3522

    SHA256

    1443d65b93d103e1a0518840e4ffdb969a1891eac2311f5d4ad7dcd92c6de587

    SHA512

    ff3ee52c1bb440859bdb20c50b6710d4fe511c941d3e3c46b04daef51b5143b21f7594cfa093877e63bba132e5620ec4977ce6eaedfada12f12e1280cdf0f6d7

  • memory/2332-443-0x00000000087D0000-0x00000000088D0000-memory.dmp

    Filesize

    1024KB

  • memory/2332-1-0x00000000724DD000-0x00000000724E8000-memory.dmp

    Filesize

    44KB

  • memory/2332-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2332-457-0x00000000088E0000-0x0000000008AE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2332-458-0x00000000088E0000-0x0000000008AE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2332-459-0x00000000088E0000-0x0000000008AE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2332-460-0x00000000724DD000-0x00000000724E8000-memory.dmp

    Filesize

    44KB

  • memory/2332-461-0x00000000088E0000-0x0000000008AE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2332-462-0x00000000088E0000-0x0000000008AE0000-memory.dmp

    Filesize

    2.0MB

  • memory/2332-463-0x00000000088E0000-0x0000000008AE0000-memory.dmp

    Filesize

    2.0MB