Analysis

  • max time kernel
    50s
  • max time network
    39s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2024, 13:15

General

  • Target

    6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a.xls

  • Size

    1.6MB

  • MD5

    28d8c94976737103d87a68c3d577f38a

  • SHA1

    f89aac36929bdefbc03d2b70e1e5c9f556c0a992

  • SHA256

    6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a

  • SHA512

    71a1f1d96cab8c7b9ac9a91933cce8b2aaeecb3ef1c7f4733908d6e8d8a5306336c01d0b21d559ebfbff213760d1e8af482e36e9b663e0fdd9e7929f7d270ca7

  • SSDEEP

    12288:6hPMqVd/wUxd9ybvciopY9FnhULhftogqbIKeY+yg3Ciw1d74Zj:6NlRLmLhi3dU

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6f482d58269e81c3d0671ac55fb65fe95b2f059a5806f4b7f1373ad3357a7b4a.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3708
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3536
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:3308
      • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
        "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3896 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
        1⤵
          PID:4012

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/3708-2-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmp

                Filesize

                64KB

              • memory/3708-1-0x00007FF84DC4D000-0x00007FF84DC4E000-memory.dmp

                Filesize

                4KB

              • memory/3708-0-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmp

                Filesize

                64KB

              • memory/3708-4-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmp

                Filesize

                64KB

              • memory/3708-5-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-3-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmp

                Filesize

                64KB

              • memory/3708-7-0x00007FF80DC30000-0x00007FF80DC40000-memory.dmp

                Filesize

                64KB

              • memory/3708-6-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-8-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-10-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-9-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-12-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-13-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-11-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-15-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-17-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-18-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-14-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-19-0x00007FF80B8D0000-0x00007FF80B8E0000-memory.dmp

                Filesize

                64KB

              • memory/3708-16-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-20-0x00007FF80B8D0000-0x00007FF80B8E0000-memory.dmp

                Filesize

                64KB

              • memory/3708-37-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-38-0x00007FF84DC4D000-0x00007FF84DC4E000-memory.dmp

                Filesize

                4KB

              • memory/3708-39-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB

              • memory/3708-40-0x00007FF84DBB0000-0x00007FF84DDA5000-memory.dmp

                Filesize

                2.0MB