Analysis

  • max time kernel
    17s
  • max time network
    15s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2024 23:05

General

  • Target

    Catalogo Enjoytics.xlsx

  • Size

    338KB

  • MD5

    6ec58aeb9431b2a9834ffcc44fffecc1

  • SHA1

    2a18f668be8795623aea8b06ac002895d30d99b0

  • SHA256

    807eaf22e661080af18a5c613c2f70dcd6b63fbf843f0a6aec149a578f3c79d6

  • SHA512

    499d819b5c92236764302846ae8bda4c8df6b1ba120be75f16587ee93d56f1c15734ffdd642ac9dae364287622fcefb10ab7ce33552d3d81dd18814250736655

  • SSDEEP

    6144:yLhDjqap7A7qfWFMDk4DVCR+ZRCn6VDZkuarvL8C7DsWokMHz:QPTAmR3D7c6VDZkuarvL8yoWo

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Catalogo Enjoytics.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2180

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2180-0-0x00007FFC44490000-0x00007FFC444A0000-memory.dmp

    Filesize

    64KB

  • memory/2180-2-0x00007FFC44490000-0x00007FFC444A0000-memory.dmp

    Filesize

    64KB

  • memory/2180-1-0x00007FFC44490000-0x00007FFC444A0000-memory.dmp

    Filesize

    64KB

  • memory/2180-3-0x00007FFC44490000-0x00007FFC444A0000-memory.dmp

    Filesize

    64KB

  • memory/2180-4-0x00007FFC44490000-0x00007FFC444A0000-memory.dmp

    Filesize

    64KB

  • memory/2180-5-0x00007FFC844AD000-0x00007FFC844AE000-memory.dmp

    Filesize

    4KB

  • memory/2180-7-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-6-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-8-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-10-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-9-0x00007FFC421F0000-0x00007FFC42200000-memory.dmp

    Filesize

    64KB

  • memory/2180-13-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-12-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-11-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-14-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB

  • memory/2180-15-0x00007FFC421F0000-0x00007FFC42200000-memory.dmp

    Filesize

    64KB

  • memory/2180-16-0x00007FFC84410000-0x00007FFC84605000-memory.dmp

    Filesize

    2.0MB