Analysis

  • max time kernel
    101s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/02/2024, 19:47

General

  • Target

    v1.3.2/Guides & Documentation/Wild Pokémon Guide v1_3_2.xlsx

  • Size

    47KB

  • MD5

    24af6800688d6769199832ab93e3a84c

  • SHA1

    3d6c37c4ca0e3501655b808c3930ce55403f6cd2

  • SHA256

    f18c84b3c9ccae596b241cb8d716de78ffe0ccc363d2663dbde17b5bb6e5fba7

  • SHA512

    cc0e4ea7335ae038bf9aad03ba2d8fef94d23449f3993cbfe2e68c16549734e08ee9be53c7605ce4d13255511db299a380ba825e44f96762221a185d54695979

  • SSDEEP

    768:WEwEhYBqNRFoC0rc5zER64HjjMal93HO5DS6bM8tjHDaj5sk74nBtcAJz8Ne:WMOBiRFozKERnjhHODS6bbjja6j0e

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\v1.3.2\Guides & Documentation\Wild Pokémon Guide v1_3_2.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4888-0-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-1-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-3-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-4-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-5-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-2-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-7-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-6-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-8-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-9-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-11-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-12-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-10-0x00007FF9CB4B0000-0x00007FF9CB4C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-13-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-14-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-16-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-17-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-15-0x00007FF9CB4B0000-0x00007FF9CB4C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-18-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-19-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-20-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-21-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-22-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-23-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-32-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-33-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-46-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-48-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-49-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-50-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-51-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-52-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB

  • memory/4888-47-0x00007FF9CD6B0000-0x00007FF9CD6C0000-memory.dmp

    Filesize

    64KB

  • memory/4888-53-0x00007FFA0D630000-0x00007FFA0D825000-memory.dmp

    Filesize

    2.0MB