Analysis

  • max time kernel
    15s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 21:30

General

  • Target

    5b55e13b6a5593a453332ef874b6223d3da0651d191b2f6e1fd53a7aba59ef61.xlsm

  • Size

    20KB

  • MD5

    80496850a2fd394a83af2a55f98d27f9

  • SHA1

    afc2cf46b162426c3eafb196f9aeacb0792216fc

  • SHA256

    5b55e13b6a5593a453332ef874b6223d3da0651d191b2f6e1fd53a7aba59ef61

  • SHA512

    430478c53bdbdc445d1cfccac3cc5ffc7f4e73f0f2cb5a74056bbfc7435c68cc2fb1af5f9853705242eb5c45a56509dba629c654ed8341e88a12ecbfabc1db65

  • SSDEEP

    384:80bOUlM9zF4QQM9+0W7Z47UfudvnS6dG/lBnELuuYqZ:8Fxx4m9+0g47EiS/lBnELPYqZ

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\5b55e13b6a5593a453332ef874b6223d3da0651d191b2f6e1fd53a7aba59ef61.xlsm
    1⤵
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1076

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1076-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

          Filesize

          64KB

        • memory/1076-1-0x000000007408D000-0x0000000074098000-memory.dmp

          Filesize

          44KB

        • memory/1076-8-0x0000000006D40000-0x0000000006E40000-memory.dmp

          Filesize

          1024KB

        • memory/1076-10-0x000000007408D000-0x0000000074098000-memory.dmp

          Filesize

          44KB

        • memory/1076-11-0x0000000006D40000-0x0000000006E40000-memory.dmp

          Filesize

          1024KB