Analysis

  • max time kernel
    142s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2023, 21:59

General

  • Target

    JPExcel.xlsx

  • Size

    88KB

  • MD5

    40ae477a3ef5d443269805f814fa2b3f

  • SHA1

    8ded6221a9ade3a44a3274681bdee4c8fa7d28be

  • SHA256

    76ddfc106be6f9222fecd98169246dca5bdce22e09f896d0399e349c185deb04

  • SHA512

    03024e196e100f5f72dd0ab32eabc9c5aa7ae8fe45cfe3a458483e3d278bae019ee584ec5197e34e4172e45ebe2307d3e214bd0e0d6e64678cd23ca88ea83c3f

  • SSDEEP

    1536:lv2yNHP9p0zUYkZPa5BDt7nlF4NjAyhwPOkA5bVhP0cE1fgr:V2yNHPM4YMP+DNcNB6Op5J10cSfS

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JPExcel.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:440

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/440-0-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-1-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-2-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-5-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-6-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-4-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-7-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-8-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-3-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-9-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-10-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-11-0x00007FF98F8D0000-0x00007FF98F8E0000-memory.dmp

    Filesize

    64KB

  • memory/440-12-0x00007FF98F8D0000-0x00007FF98F8E0000-memory.dmp

    Filesize

    64KB

  • memory/440-14-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-15-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-32-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-33-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-35-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-34-0x00007FF992050000-0x00007FF992060000-memory.dmp

    Filesize

    64KB

  • memory/440-36-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-37-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-39-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB

  • memory/440-38-0x00007FF9D1FD0000-0x00007FF9D21C5000-memory.dmp

    Filesize

    2.0MB