Analysis

  • max time kernel
    99s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2023, 06:59

General

  • Target

    Braemar MTM Report.xlsx

  • Size

    6KB

  • MD5

    3f06247eb6e2f3fdd3da7bf4848fcaab

  • SHA1

    15fd928dabd8577e88df8877ca62cfb38767d176

  • SHA256

    0a0b82b9c30f13d6cf38047aef70fd766780ecbe8fd7322db2c72823ed5e768c

  • SHA512

    b3d1e0360b44018fc6b07140e0f2f4a3323f20577685d3a6375e1a164fc00ea9ed807ce57d4fdc4ef26e36b9528a831fad5b6eaea7921893c62fafb6d86af15d

  • SSDEEP

    96:9sFneyVAmqFr+fifmgVotsCfvA/417AV0R7I9xUUOtCaZrshHOt:9kneyqmqFr+a++ITgY7V5HfCCQJa

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Braemar MTM Report.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4968

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/4968-133-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-134-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-135-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-136-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-137-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-138-0x00007FFACB6F0000-0x00007FFACB700000-memory.dmp

          Filesize

          64KB

        • memory/4968-139-0x00007FFACB6F0000-0x00007FFACB700000-memory.dmp

          Filesize

          64KB

        • memory/4968-159-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-160-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-161-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB

        • memory/4968-162-0x00007FFACD990000-0x00007FFACD9A0000-memory.dmp

          Filesize

          64KB