Analysis

  • max time kernel
    142s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-08-2023 16:00

General

  • Target

    FACTURA_3609824.xltx

  • Size

    742KB

  • MD5

    4178c9328d164a6171ddccb870875306

  • SHA1

    b2001909b10fe86fb9dc1378ee4ab8e3c2751e4c

  • SHA256

    e1890dc28d56e185e93a37e7a7ffc30c6a681f45f37cd366e4964643333c1983

  • SHA512

    010d19695394b02e54867b851e1b2cae2af3ce308b43425cf8ab794ef7113edf194dbe25373b7f48bafab56def8507423011407eeb41826c3385196e42a24590

  • SSDEEP

    12288:ckLMwkWwoSNubsgYWVlwR8JSy9qklrd+akecnt7XUFZd+9j/50vQmnwCErRh:cD9XjgJz0mXYklrdbkecnUL+990vwC8

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\FACTURA_3609824.xltx"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4656

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4656-133-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-134-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-135-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-136-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-137-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-138-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-139-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-140-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-141-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-142-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-143-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-145-0x00007FFAEE1A0000-0x00007FFAEE1B0000-memory.dmp

    Filesize

    64KB

  • memory/4656-146-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-144-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-147-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-149-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-148-0x00007FFAEE1A0000-0x00007FFAEE1B0000-memory.dmp

    Filesize

    64KB

  • memory/4656-150-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-151-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-152-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-153-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-154-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-159-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-160-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4656-178-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-179-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-180-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-181-0x00007FFAF0230000-0x00007FFAF0240000-memory.dmp

    Filesize

    64KB

  • memory/4656-182-0x00007FFB301B0000-0x00007FFB303A5000-memory.dmp

    Filesize

    2.0MB