Analysis

  • max time kernel
    149s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 08:14

General

  • Target

    598c6190ebbb1c203891304effb88b1d779ec458ab814661bbfac0c8e40b7052.xls

  • Size

    1.4MB

  • MD5

    6c54a3f59cc2f2d168108c397b8f6898

  • SHA1

    8434ee2227cd79892786cd140e730f0de70bacae

  • SHA256

    598c6190ebbb1c203891304effb88b1d779ec458ab814661bbfac0c8e40b7052

  • SHA512

    4e7ec9a90369dd65204142284b4f1fe6650ef166dfbc1923399c63af3c482eba7b6f50db293e490ceb091d7c50a0155eeceec0fae75bca63ec10bdacc672b3e8

  • SSDEEP

    24576:5dmLj6Sual+6QXrR8LZ0AUHNXK7fHinIsva:jmCSua46QXwZ03X0PB

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\598c6190ebbb1c203891304effb88b1d779ec458ab814661bbfac0c8e40b7052.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1492

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1492-0-0x00007FFAF0110000-0x00007FFAF0120000-memory.dmp

    Filesize

    64KB

  • memory/1492-2-0x00007FFAF0110000-0x00007FFAF0120000-memory.dmp

    Filesize

    64KB

  • memory/1492-1-0x00007FFAF0110000-0x00007FFAF0120000-memory.dmp

    Filesize

    64KB

  • memory/1492-3-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-4-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-5-0x00007FFAF0110000-0x00007FFAF0120000-memory.dmp

    Filesize

    64KB

  • memory/1492-6-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-7-0x00007FFAF0110000-0x00007FFAF0120000-memory.dmp

    Filesize

    64KB

  • memory/1492-8-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-9-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-10-0x00007FFAED7B0000-0x00007FFAED7C0000-memory.dmp

    Filesize

    64KB

  • memory/1492-11-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-12-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-13-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-14-0x00007FFAED7B0000-0x00007FFAED7C0000-memory.dmp

    Filesize

    64KB

  • memory/1492-15-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-16-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-17-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-18-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-19-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-20-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-21-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-22-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-23-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB

  • memory/1492-30-0x00007FFB30090000-0x00007FFB30285000-memory.dmp

    Filesize

    2.0MB