Analysis

  • max time kernel
    140s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-05-2024 07:20

General

  • Target

    202404294766578200.xlam

  • Size

    606KB

  • MD5

    9336f772a40e762cc855b7c9b75b1d28

  • SHA1

    837d90dbe2f9c267e26ad4e170b7bd03d199f335

  • SHA256

    ca377ebfd8e0d57754a3780b6b7360a76efad94c8d5753e172a52802bf109ddc

  • SHA512

    c9d7e7b081ec7360a0f473e2eac01c821b0fbf824d0973eacd6cd0e687f04723df63297a28d4b20ae65948c89560c0b6ce644deee90ef3ac78b15bbeb20b0f1c

  • SSDEEP

    12288:T6nWUgUjdBVpgh0TL1ftjVi7oToJcMAr7pVFMqe2nH61vSp3qE/8LOKqYsN5/:+QWVWYVoZAnP42n4KZX/8LtqYEx

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\202404294766578200.xlam"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4084

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4084-0-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-3-0x00007FFF93DAD000-0x00007FFF93DAE000-memory.dmp

    Filesize

    4KB

  • memory/4084-2-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-5-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-4-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-7-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-9-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-8-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-6-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-1-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-11-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-10-0x00007FFF517B0000-0x00007FFF517C0000-memory.dmp

    Filesize

    64KB

  • memory/4084-13-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-12-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-16-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-15-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-14-0x00007FFF517B0000-0x00007FFF517C0000-memory.dmp

    Filesize

    64KB

  • memory/4084-31-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB

  • memory/4084-48-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-49-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-51-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-50-0x00007FFF53D90000-0x00007FFF53DA0000-memory.dmp

    Filesize

    64KB

  • memory/4084-52-0x00007FFF93D10000-0x00007FFF93F05000-memory.dmp

    Filesize

    2.0MB