Analysis

  • max time kernel
    112s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 18:48

General

  • Target

    SBM_C3350i240229122.xls

  • Size

    967KB

  • MD5

    30c72d7387b2033675119cc82906bbb8

  • SHA1

    e3c3f070b85f9c991069b408e7147bd1b19882bb

  • SHA256

    93b2af1c877bb2c7acd39d3ff5f770bea880bf66477e4e9b0a1d21d1d213cb7c

  • SHA512

    3368a3bb66f88dde45120e072b9a04a36d799961dcb230785745ba5ee916ebf8272fc2fb896a935ddfcc636fe7e09e0711fa0f663674eb08461fde44a6602f69

  • SSDEEP

    24576:SUP/mMxAF77GF0SNjs6ivPQbA2j3AOk6N1Y:SGsNk0SNjs5PAVUl

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SBM_C3350i240229122.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:856

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/856-0-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-2-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-1-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-3-0x00007FFE4F64D000-0x00007FFE4F64E000-memory.dmp
    Filesize

    4KB

  • memory/856-4-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-5-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-6-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-7-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-10-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-9-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-8-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-11-0x00007FFE0D450000-0x00007FFE0D460000-memory.dmp
    Filesize

    64KB

  • memory/856-12-0x00007FFE0D450000-0x00007FFE0D460000-memory.dmp
    Filesize

    64KB

  • memory/856-13-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-20-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB

  • memory/856-38-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-39-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-41-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-40-0x00007FFE0F630000-0x00007FFE0F640000-memory.dmp
    Filesize

    64KB

  • memory/856-42-0x00007FFE4F5B0000-0x00007FFE4F7A5000-memory.dmp
    Filesize

    2.0MB