Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/03/2024, 09:19

General

  • Target

    76748bccd7fedb08b3da8bbbb30d9adc4af3bd1c54744e4c4046746b744a4176.xls

  • Size

    317KB

  • MD5

    bb4251c17cc6349f7e0a55a9b61514af

  • SHA1

    32a58b8f867b69cdf383bd79b8f1fe5dd69249e3

  • SHA256

    76748bccd7fedb08b3da8bbbb30d9adc4af3bd1c54744e4c4046746b744a4176

  • SHA512

    1f84589ae875504d42f1835174b5a215aba976c1c992cd0b60ffd9a6b213da39e83be77209e8a2ff88a796ea5592324769c56ef76b1a54539e205839286bad65

  • SSDEEP

    6144:u0unJa+CumzY35qAOJl/YrLYz+WrNhZF+E+fgL+0dD8ivSbV25MI+89JOvG4UHq/:u9Jqde3bV25MI2oHCEQv

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\76748bccd7fedb08b3da8bbbb30d9adc4af3bd1c54744e4c4046746b744a4176.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1404-0-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-2-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-1-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-3-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-4-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-5-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-7-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-8-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-9-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-6-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-10-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-11-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-12-0x00007FFECAB20000-0x00007FFECAB30000-memory.dmp

    Filesize

    64KB

  • memory/1404-13-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-14-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-15-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-16-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-17-0x00007FFECAB20000-0x00007FFECAB30000-memory.dmp

    Filesize

    64KB

  • memory/1404-18-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-19-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-21-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-20-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-22-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-23-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-39-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-40-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-41-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-64-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-65-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-66-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-67-0x00007FFECCDB0000-0x00007FFECCDC0000-memory.dmp

    Filesize

    64KB

  • memory/1404-68-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB

  • memory/1404-69-0x00007FFF0CD30000-0x00007FFF0CF25000-memory.dmp

    Filesize

    2.0MB