Analysis

  • max time kernel
    114s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-04-2024 11:59

General

  • Target

    Paddle, Blanks and Spacers/Cheniere SP CO2 FEED - Paddles Blanks and Spacers RFP.xlsx

  • Size

    97KB

  • MD5

    15d4228da668831af0007c4bdd5a118d

  • SHA1

    1221c2bb40d0dba9e5e56b6d38843e3fa336d28a

  • SHA256

    db9670e4520b320040356f558a94045b34f06d9c294a3db5577d3e1b127a343e

  • SHA512

    2475568aed1ae34cb3ec69c18a689aec3ae64bc4b3e4b15afc6ade55009b073c2c621093eac7c76917442bc6bcf5424e840300ba357b6a336e5f03bef0cad9d3

  • SSDEEP

    3072:i9FnBVIvQMkxzcM7cp6Xwr3oAwi5h0MXS7K9O045:sFtcM7cpqAwiv0oXC

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Paddle, Blanks and Spacers\Cheniere SP CO2 FEED - Paddles Blanks and Spacers RFP.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4444

Network

MITRE ATT&CK Matrix ATT&CK v13

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4444-0-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-1-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-2-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-3-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-5-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-4-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-7-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-6-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-8-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-9-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-10-0x00007FFC3BA90000-0x00007FFC3BAA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-11-0x00007FFC3BA90000-0x00007FFC3BAA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-15-0x0000017DA4870000-0x0000017DA48A1000-memory.dmp
    Filesize

    196KB

  • memory/4444-16-0x0000017DA1660000-0x0000017DA1689000-memory.dmp
    Filesize

    164KB

  • memory/4444-19-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-45-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-46-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-47-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-48-0x00007FFC3DC90000-0x00007FFC3DCA0000-memory.dmp
    Filesize

    64KB

  • memory/4444-50-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-49-0x0000017DA4870000-0x0000017DA48A1000-memory.dmp
    Filesize

    196KB

  • memory/4444-51-0x00007FFC7DC10000-0x00007FFC7DE05000-memory.dmp
    Filesize

    2.0MB

  • memory/4444-52-0x0000017DA1660000-0x0000017DA1689000-memory.dmp
    Filesize

    164KB