Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    09/09/2024, 18:23

General

  • Target

    09092024125309092024TWSPO331120240909003.xls

  • Size

    185KB

  • MD5

    f9ab1d7b74030338276597360d1f1fe9

  • SHA1

    08dd4159d3e19c3f1140f07300d80ef64f1d75ef

  • SHA256

    34a9da84adcef6ef3408b20bbdedfab6b961640ef765dbe1cb86cb3c48daa173

  • SHA512

    65093248fb4adb398b926cac06b02960377974bc7cc4cba68e8f444efb48df69b16197535331ec5b047c78236f4f987d830ee4aeec44fadcad38b73ce7aed669

  • SSDEEP

    3072:uXINL0+hGvRHDfiQZUZN32/VcgQ0RIsjO2z+NP0qJHuMmOboPywH:u4Z0LJHDSZNrD0esK2ajJSOyB

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\09092024125309092024TWSPO331120240909003.xls
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3020
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    PID:524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    477341b96ff31d5d0cc11fdbd6eaca57

    SHA1

    05f0e600eb9f30366183b584d4e6c76ded07746b

    SHA256

    ba82c38d4db1aeaa50c880b9cd1aebaaccbd6e9b84137245bba2dba6d2cd7947

    SHA512

    f80126d1e41202443ebb31264d5c70b01f7e551b5fa4498db602f87824dcf351f3aeb3a8814550976fe1f8bc70f07f10587c69e2cfe488314397d3de1c7b84a4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    555f06562d84c651989da999b2f2ffed

    SHA1

    a92f99ca18069367e5f90cc551bcdbf2b2e367cc

    SHA256

    442efd2ed928058c9c0cafd67dd2532cf2abe1059a83a1643ba7e1da5039153d

    SHA512

    7c64146dffb7a880286a719f94804baca36d0350a5c47de0e9048db7352daf1b941f6d60d01838ee3df957fb9e4d6ba295c6c0c98b5e7e0ef4693a153be4affe

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F9A3882743D2AC20C14DC1AA08452932

    Filesize

    472B

    MD5

    63daf55b4a226d6a9ad2b72f8277cedd

    SHA1

    9dd2f275d8269f0a6f06a8fce0239d7f1f7deba1

    SHA256

    fc10e886f13ae4b9dd611209d03f8ef314829cfb09988f665b15f55ecd15556c

    SHA512

    e24a5b4fa9e72000a6d7640a63f6d5b972f9ad31d21f17bcb208d1b4571b56fa68c53ff6f3750bdea97c89c81d6a477407a77edc3e191565c746e683cb2af20c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    c6c48835f0a726bad52eb54c2f1d3719

    SHA1

    7aa816e694b25059961023a735f6313986c2c22d

    SHA256

    16bcf157ea6d33b98e006bb5440f00439aadb9d0f57163c30bc99ed15900a883

    SHA512

    4d017ddf54089f629eb0bef2e708e94d18ba2fb82aa3cc16aa551f7f5b1ec1c3229dd223e99a75cf2bb91d8ab0e3179dcabf25ba7f63a5c54805867d9e47b47b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ed1ec3ac0c767e03efa039e319e087f8

    SHA1

    7a1d3efabd1b5da257dd634f0bef5d76799fc0cb

    SHA256

    04bbf1c1b4e6c8a8954860b14c51b7d384cb5bf80c40a6e8595b2ca4d1b8d08d

    SHA512

    49b7b3ebd91cf1125fcc4f55a9ab4b48f1c743852a2a3249cf24311cbea51ff0a389ef62fe95ca68af7efa25dbcf85f7c21858f0c6dc1edfc4d1978e13efaa20

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    ba90bd28b6ac8d5815b8a87d5ed66605

    SHA1

    f32e2e702f0d01873949278b4cac1303b08ffaff

    SHA256

    250e80f7079b914fce05dc81b67d5d6639b71c7fb3e8d8d8523ca5549fdc9ebb

    SHA512

    11f160f9e9e89b86e978233dca90c6b6ea320d2d111c1497b356419df2b10f76656dce523f2dbfe9d4f09c56a8a5e5eab51c22ec06fde93795e5a3251478e510

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F9A3882743D2AC20C14DC1AA08452932

    Filesize

    480B

    MD5

    30687ea22d97847a80f72765ba86915d

    SHA1

    6c676d35cb400bafdca167428e4e93a41ccf5aad

    SHA256

    7e12b16207ad5ec27e59b830def7f95eb99069b576496b398111f0368ffda152

    SHA512

    14da4c4e8971ac71b80ab2aa346b99ffd88aa6e621dea111aa77f3a8e2c99e751d2dbbf728e5716e3b6f48c393e3158b092da3d0a2d856e9ae2b5f7bc83b68ec

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\AS91FDNI\IEnetworkcreatedudpate[1].hta

    Filesize

    4KB

    MD5

    efc4404853fc18d35366956b310c25ca

    SHA1

    d90fd8c82822818a4b0c689c21f8c0405494f2bd

    SHA256

    bea2e356e6e01d835d61402c49babc9d933a05f015e1e5dc8aaa0e97ea921341

    SHA512

    ffd5d3c09e9a521e47b5c864f161f580c31665bd8dd43fbde544bcd5bd2dfa153ac6198dd20dda8c70c74f529416ecf70a4eace8ebdbb30e2b13f329c622dfe5

  • C:\Users\Admin\AppData\Local\Temp\CabBCAE.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarBCD0.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\4FFPUT9P.txt

    Filesize

    109B

    MD5

    efb3dffd82dd8c04e119f649203a1221

    SHA1

    aa4cde4271a0aa72b89a215aac3d9473cea84e98

    SHA256

    9e8fb76ba09843e088a8bb41d04062648a9787382c20dd65418a823b609b73e3

    SHA512

    3de873ed3ade97fa08a8a6f056ef713ba25511f0c2ff4f4f1dfa842890ec0dc2b703cfb10b2956f84bbd64a180d346180e5d5964ba64dabc01947c896d797e0a

  • memory/524-60-0x0000000001170000-0x0000000001172000-memory.dmp

    Filesize

    8KB

  • memory/3020-61-0x0000000002430000-0x0000000002432000-memory.dmp

    Filesize

    8KB

  • memory/3020-58-0x0000000071F3D000-0x0000000071F48000-memory.dmp

    Filesize

    44KB

  • memory/3020-1-0x0000000071F3D000-0x0000000071F48000-memory.dmp

    Filesize

    44KB

  • memory/3020-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3020-80-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/3020-83-0x0000000071F3D000-0x0000000071F48000-memory.dmp

    Filesize

    44KB