Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 17:44

General

  • Target

    2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll

  • Size

    130KB

  • MD5

    f5c5e1f7b2fda6346989fc1bbe6b7657

  • SHA1

    6f2d97035993d41b2f3867fa657a3b06cb67929b

  • SHA256

    2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32

  • SHA512

    d245ebf51129f4abf3e3bae94583d51ada5104ae0c98ad370163e93c54f6ba8fa427b044352068ce9e3b2fe00caea8f1d2f2684401e10289574f8f5d9dd0dbfd

  • SSDEEP

    1536:n5LZElpqZElpuqnAJcFUg+Rxp87eQWBfrHxgAMYvtp40n:nrYEYITCig+oOfrH2nYt7

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2504

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll

    Filesize

    64KB

    MD5

    61502e2f792650acd1f7a209f7a3fb46

    SHA1

    21d8b7d5cf92bc60bf049fc2a0fa0368b7fef4fb

    SHA256

    b9b4f7a127fe3f43f122bb903fef9a3c8ed0ea1cdf4242d72f6ec3a0c6234f99

    SHA512

    925db8839439782d4cf8fd1e38969e38a9fd6ca4c8530d7518fbae185471d3f29b90774a2acd9e29d9e9812e68cb6ac2f792581110a5886022f58c4b782f287f

  • memory/2504-1-0x0000000071D2D000-0x0000000071D38000-memory.dmp

    Filesize

    44KB

  • memory/2504-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2504-2-0x000000006C680000-0x000000006C6CA000-memory.dmp

    Filesize

    296KB

  • memory/2504-4-0x000000006C680000-0x000000006C6CA000-memory.dmp

    Filesize

    296KB

  • memory/2504-5-0x0000000071D2D000-0x0000000071D38000-memory.dmp

    Filesize

    44KB

  • memory/2504-6-0x000000006C680000-0x000000006C6CA000-memory.dmp

    Filesize

    296KB