Analysis

  • max time kernel
    47s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/05/2024, 03:31

General

  • Target

    8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422.xlsm

  • Size

    92KB

  • MD5

    bfa72dacccf8fa4fac595cbecf098d83

  • SHA1

    a14288d37cded5e7ece6c7c5dc6de6141e57375b

  • SHA256

    8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422

  • SHA512

    318baf0ac048b9e76c5bb74ce2db3bc7e809425ba8c8745dcbbd27475b6755002311eabaf16c4ad41ef2a039bafb4f52eea6f4d4e26574d15b5f7bd58afa5b57

  • SSDEEP

    1536:CguZCa6S5khUI/UXnctY04znOSjhLzVubGa/M1NIpPkUlB7583fjncFYIIJV8F0:Cgugapkhl/UstY0aPjpzVw/Ms8ULavLJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4392-0-0x00007FFC9E630000-0x00007FFC9E640000-memory.dmp

    Filesize

    64KB

  • memory/4392-1-0x00007FFCDE64D000-0x00007FFCDE64E000-memory.dmp

    Filesize

    4KB

  • memory/4392-3-0x00007FFC9E630000-0x00007FFC9E640000-memory.dmp

    Filesize

    64KB

  • memory/4392-2-0x00007FFC9E630000-0x00007FFC9E640000-memory.dmp

    Filesize

    64KB

  • memory/4392-4-0x00007FFC9E630000-0x00007FFC9E640000-memory.dmp

    Filesize

    64KB

  • memory/4392-5-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-8-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-9-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-7-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-14-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-13-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-15-0x00007FFC9C090000-0x00007FFC9C0A0000-memory.dmp

    Filesize

    64KB

  • memory/4392-12-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-16-0x00007FFC9C090000-0x00007FFC9C0A0000-memory.dmp

    Filesize

    64KB

  • memory/4392-11-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-19-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-18-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-17-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-10-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-6-0x00007FFC9E630000-0x00007FFC9E640000-memory.dmp

    Filesize

    64KB

  • memory/4392-70-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-158-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-159-0x00007FFCDE64D000-0x00007FFCDE64E000-memory.dmp

    Filesize

    4KB

  • memory/4392-160-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB

  • memory/4392-161-0x00007FFCDE5B0000-0x00007FFCDE7A5000-memory.dmp

    Filesize

    2.0MB