Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    26-11-2024 21:59

General

  • Target

    Account Statement.xll

  • Size

    892KB

  • MD5

    b50fea4606274bedc8d82dfdb050894e

  • SHA1

    3fbc9e317c1d373fa02e0c6ec4b615f334e3104c

  • SHA256

    df51d17576e6b5ff7488221079a6d0beb42cebf347c7ea04f4b07f2188863a16

  • SHA512

    fdfbd571b5c018b0b50ae025e59069f2e5b708af53c4df5e888328c0d7d0d4d70c8e8a3f8b5be708a49ec3bfa6d6a37dd2c0e932980c849e95ba17a233c3d95a

  • SSDEEP

    24576:IzbGHAzHAjX1VcLg5KzdcXDq3oKLGIua:IziHILEgzdIeYKSa

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Account Statement.xll"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Account Statement.xll

    Filesize

    640KB

    MD5

    3d2d4ca3762616a6f135eae61f692ab7

    SHA1

    3eb97a2d4eed8d7d4ef1f10ad9dc089d391aea36

    SHA256

    08b377d2654908776999ec971eb338e8da193282b65711ccd2ef4f4d56798342

    SHA512

    abb7267add09eba2b6cca9929d04a26138fc33c2073f4a1850f1a63c33ea109c621ac41414e93a95e6ec213fb7d7d4fa09582fdfec266be988d6bf559d2803af

  • memory/2184-1-0x000000007201D000-0x0000000072028000-memory.dmp

    Filesize

    44KB

  • memory/2184-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2184-3-0x000000007201D000-0x0000000072028000-memory.dmp

    Filesize

    44KB