Analysis

  • max time kernel
    694s
  • max time network
    1146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/07/2023, 02:25

General

  • Target

    CDSMedical.xlsx

  • Size

    67KB

  • MD5

    010bf95563888bbab0bd5b883d265543

  • SHA1

    45a5193ee04b41a14187c6af5935bf513d6ba0b2

  • SHA256

    8d948b67704edee74a22d4dcab05725f76a206134ceae28f562f6b7d00a8f7e2

  • SHA512

    9ec4691ef96908efa9b8c0a9dc68182152bb8b286d56115b250fbe0a002b28b30fd3bf40ced23b345351ea7f5eea7b42f2acd74668ae192a59d625f548d0e61d

  • SSDEEP

    1536:6DxWaAzyUC6rcoRMu4iQMUjjpQMH67cUF1m3eS2g:6DBWBRd4iQMUjN67XmSg

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\CDSMedical.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3868

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3868-133-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-134-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-136-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-135-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-138-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-137-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-139-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-140-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-141-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-142-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-143-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-144-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-145-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-146-0x00007FFEAF310000-0x00007FFEAF320000-memory.dmp

    Filesize

    64KB

  • memory/3868-147-0x00007FFEAF310000-0x00007FFEAF320000-memory.dmp

    Filesize

    64KB

  • memory/3868-150-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-151-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-152-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB

  • memory/3868-173-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-174-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-175-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-176-0x00007FFEB1910000-0x00007FFEB1920000-memory.dmp

    Filesize

    64KB

  • memory/3868-177-0x00007FFEF1890000-0x00007FFEF1A85000-memory.dmp

    Filesize

    2.0MB