Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/03/2024, 21:47

General

  • Target

    99eece7cf85b9ecfbefbf8e34debc60127e32137ad087d25478223e6f7093e6a.xls

  • Size

    275KB

  • MD5

    522b50445071a4992b32a90e18550010

  • SHA1

    b42d555d65431dc115f19ef521bb9701b2c03550

  • SHA256

    99eece7cf85b9ecfbefbf8e34debc60127e32137ad087d25478223e6f7093e6a

  • SHA512

    42b8e4ecbda3a8d2975bc3f216d0ead692614e7fb04e87ffc4adb90b64d1fa405e7d44943b24b658e7b201b8373ad4c1c66a75035574ff308b5f30b1ce5f2b27

  • SSDEEP

    6144:hxEtjPOtioVjDGUU1qfDlavx+W2QnRr/6LJdbcO7F+JdRZSC3fNvTNR/NRLN04c/:omLfbD7x

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\99eece7cf85b9ecfbefbf8e34debc60127e32137ad087d25478223e6f7093e6a.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1972

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1972-0-0x00007FFC858B0000-0x00007FFC858C0000-memory.dmp

    Filesize

    64KB

  • memory/1972-1-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-2-0x00007FFC858B0000-0x00007FFC858C0000-memory.dmp

    Filesize

    64KB

  • memory/1972-3-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-4-0x00007FFC858B0000-0x00007FFC858C0000-memory.dmp

    Filesize

    64KB

  • memory/1972-5-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-7-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-6-0x00007FFC858B0000-0x00007FFC858C0000-memory.dmp

    Filesize

    64KB

  • memory/1972-8-0x00007FFC858B0000-0x00007FFC858C0000-memory.dmp

    Filesize

    64KB

  • memory/1972-9-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-10-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-11-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-12-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-13-0x00007FFC83850000-0x00007FFC83860000-memory.dmp

    Filesize

    64KB

  • memory/1972-14-0x00007FFC83850000-0x00007FFC83860000-memory.dmp

    Filesize

    64KB

  • memory/1972-16-0x0000018CF5F90000-0x0000018CF6190000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-61-0x0000018CF3280000-0x0000018CF4250000-memory.dmp

    Filesize

    15.8MB

  • memory/1972-70-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-71-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-72-0x00007FFCC5830000-0x00007FFCC5A25000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-73-0x0000018CF5F90000-0x0000018CF6190000-memory.dmp

    Filesize

    2.0MB

  • memory/1972-74-0x0000018CF3280000-0x0000018CF4250000-memory.dmp

    Filesize

    15.8MB