Analysis

  • max time kernel
    32s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-05-2024 02:33

General

  • Target

    bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f.xls

  • Size

    111KB

  • MD5

    55c2d2ca19984dd2eabefa9b949c5c99

  • SHA1

    661da176d58427e7264183a08d923d890600d4fa

  • SHA256

    bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f

  • SHA512

    2e6167908e09268c4b7e0e0203802e907106db56c103488f4d7c75a1b315292a06065b7f1d9cfa45ff850c6a954be78e9541999a2ba7a5aaea5d3e88487e89ce

  • SSDEEP

    3072:aTxEtjPOtioVjDGUU1qfDlaGGx+cW/IEuz59V2/hdMXAfPB:ixEtjPOtioVjDGUU1qfDlavx+//IE

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3044-0-0x00007FFC05A50000-0x00007FFC05A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-1-0x00007FFC45A6D000-0x00007FFC45A6E000-memory.dmp

    Filesize

    4KB

  • memory/3044-2-0x00007FFC05A50000-0x00007FFC05A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-3-0x00007FFC05A50000-0x00007FFC05A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-4-0x00007FFC05A50000-0x00007FFC05A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-6-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-5-0x00007FFC05A50000-0x00007FFC05A60000-memory.dmp

    Filesize

    64KB

  • memory/3044-7-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-8-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-12-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-11-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-14-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-15-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-16-0x00007FFC039A0000-0x00007FFC039B0000-memory.dmp

    Filesize

    64KB

  • memory/3044-13-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-10-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-9-0x00007FFC039A0000-0x00007FFC039B0000-memory.dmp

    Filesize

    64KB

  • memory/3044-17-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-41-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB

  • memory/3044-46-0x00007FFC459D0000-0x00007FFC45BC5000-memory.dmp

    Filesize

    2.0MB