Analysis

  • max time kernel
    200s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 23:12

General

  • Target

    d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410.xls

  • Size

    663KB

  • MD5

    64ba951987cc51900db5f1f35d5e836d

  • SHA1

    25efcd9c5e536c2223bd36714da20da29441880f

  • SHA256

    d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410

  • SHA512

    e92844700b8d67ca37c231c1117289af0771ec6a7c88b1f3f96fc9d43a3a578bcdb7e9e55fd88a483317d5482e4f755b1f7733aca373fba049fb2f2c412c3710

  • SSDEEP

    12288:zfIQEkONm1fwD6C3BPFEWUVsj/pqviXDXK2L:z3NF1fw6iQipqvGVL

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • TA505

    Cybercrime group active since 2015, responsible for families like Dridex and Locky.

  • Loads dropped DLL 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\d918e3e78a25986e395c1c2ac02fe322d3cdb887e6ace4ce0a9a4bfdad695410.xls
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\copy13.xlsx

    Filesize

    398KB

    MD5

    31a6ba5d186614c2be8969b79c4303c8

    SHA1

    304bc5bfb4a5eef7027bfe76c114d4524bf7444c

    SHA256

    56f45130c5e7700317ebe2f358cdaded2e1b3cc22e859b87bfde272e44cad4c3

    SHA512

    c3a5e468856c4a83331f496e473f97b10f3dac74e69c01b1a230eeab3bec5ca4ec3aeccab309a3204771abb9f6f045918c7702a5c113d8aa8b9feea79065e01a

  • \Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\sample_.dll

    Filesize

    276KB

    MD5

    b84b32149c8ca555e6b9a693bfe02dfb

    SHA1

    39f6770a0a204c7ad34f9c801f8161f74d9ba7d6

    SHA256

    3e9787ece4961e7bb5b08cc6a99657befd47b5c53ed3ce8f6394a21d009ed195

    SHA512

    bcae4116c6b59dc1147164edc36e9f89e280d56597c8954ae823abb193139fbc1e63f2bacdc09171b78814aff33aa02ce096eb20a18e3c2de817ed2884ab15c9

  • memory/1416-1-0x000000007248D000-0x0000000072498000-memory.dmp

    Filesize

    44KB

  • memory/1416-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/1416-7-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-9-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-8-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-10-0x0000000007120000-0x0000000007220000-memory.dmp

    Filesize

    1024KB

  • memory/1416-11-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-12-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-13-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-14-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-15-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-19-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-18-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-17-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-16-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-20-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-38-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-40-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-48-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-42-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-41-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-39-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-37-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-30-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-28-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-26-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-56-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-55-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-54-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-53-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-52-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-51-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-50-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-49-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-27-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-25-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-24-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-23-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-47-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-22-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-29-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-21-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-66-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-63-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-79-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-78-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-74-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-68-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-67-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-65-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-64-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-62-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-61-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-97-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-160-0x000000007248D000-0x0000000072498000-memory.dmp

    Filesize

    44KB

  • memory/1416-161-0x0000000006310000-0x0000000006311000-memory.dmp

    Filesize

    4KB

  • memory/1416-187-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-186-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-189-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-196-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-202-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-209-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-208-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-207-0x0000000010000000-0x0000000010044000-memory.dmp

    Filesize

    272KB

  • memory/1416-206-0x00000000077C0000-0x00000000077C1000-memory.dmp

    Filesize

    4KB

  • memory/1416-205-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-210-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-211-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-212-0x0000000000470000-0x0000000000570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-213-0x0000000006310000-0x0000000006311000-memory.dmp

    Filesize

    4KB

  • memory/1416-214-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-216-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-217-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-218-0x0000000006470000-0x0000000006570000-memory.dmp

    Filesize

    1024KB

  • memory/1416-219-0x0000000010000000-0x0000000010044000-memory.dmp

    Filesize

    272KB