Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2023 06:15

General

  • Target

    Braemar MTM Report.xlsx

  • Size

    6KB

  • MD5

    50565329ea5a29a374094d00fe99c719

  • SHA1

    84fe84ff42aad333cdb032446eecd62daa1162fc

  • SHA256

    200b4e96b5501b6f71b3c19008d36aca7ddffcbf9f65178aecd087af1a17c034

  • SHA512

    d47c04a3ba0b67e8c265376af7ff333eb1b77d1abea6ad94037613d6ce2edf40f5bb4d7e001538844dce0bd08241ab1e37262dd337eec7e3797e4e003a296b65

  • SSDEEP

    96:7spnVeNCUG5LnyL8dyAhGx8KSiGTyjTVbUlb5rshhrCl:7snVrVNnyL8dyAsx8KSiGOlbk5Q/rCl

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Braemar MTM Report.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3860-133-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-134-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-135-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-136-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-137-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-139-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-140-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-138-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-141-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-142-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-143-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-144-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-145-0x00007FFC925C0000-0x00007FFC925D0000-memory.dmp

    Filesize

    64KB

  • memory/3860-146-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-147-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-148-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-149-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-151-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-150-0x00007FFC925C0000-0x00007FFC925D0000-memory.dmp

    Filesize

    64KB

  • memory/3860-152-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-153-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-156-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB

  • memory/3860-176-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-177-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-178-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-179-0x00007FFC94BF0000-0x00007FFC94C00000-memory.dmp

    Filesize

    64KB

  • memory/3860-180-0x00007FFCD4B70000-0x00007FFCD4D65000-memory.dmp

    Filesize

    2.0MB