Analysis

  • max time kernel
    47s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-06-2024 21:18

General

  • Target

    bff1d44197fbb9fec1f3a897d5dba3cd89081d78c2fdeefe0a7c7e7b004914f3.xlsm

  • Size

    21KB

  • MD5

    6034f6e7bca08de8a1e6135aa9c961f0

  • SHA1

    28f4eddf95a5d27a91e27a92616cdf0ea5c88ef1

  • SHA256

    bff1d44197fbb9fec1f3a897d5dba3cd89081d78c2fdeefe0a7c7e7b004914f3

  • SHA512

    1eff26586be73083974041944909ad8c97134a9f839f22e9029a2cd6530e61414f5b24178a6ef403848a3d707f3a88c782899d7013678b85878c07db5f424d8c

  • SSDEEP

    384:EtJBIhmdLfIPkwPQGkzHhcqn8W7BCHJU7uXLRPYs5elJy5rM6Q6w1HuX:5hqsToGQCq+p0uXJYOpQ6w1u

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\bff1d44197fbb9fec1f3a897d5dba3cd89081d78c2fdeefe0a7c7e7b004914f3.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:872

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/872-0-0x00007FFB74150000-0x00007FFB74160000-memory.dmp

    Filesize

    64KB

  • memory/872-1-0x00007FFB74150000-0x00007FFB74160000-memory.dmp

    Filesize

    64KB

  • memory/872-2-0x00007FFB74150000-0x00007FFB74160000-memory.dmp

    Filesize

    64KB

  • memory/872-3-0x00007FFB74150000-0x00007FFB74160000-memory.dmp

    Filesize

    64KB

  • memory/872-4-0x00007FFB74150000-0x00007FFB74160000-memory.dmp

    Filesize

    64KB

  • memory/872-8-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-9-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-7-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-6-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-5-0x00007FFBB416D000-0x00007FFBB416E000-memory.dmp

    Filesize

    4KB

  • memory/872-10-0x00007FFB71C70000-0x00007FFB71C80000-memory.dmp

    Filesize

    64KB

  • memory/872-11-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-13-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-12-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-14-0x00007FFB71C70000-0x00007FFB71C80000-memory.dmp

    Filesize

    64KB

  • memory/872-15-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-17-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-19-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-18-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-16-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB

  • memory/872-27-0x00007FFBB40D0000-0x00007FFBB42C5000-memory.dmp

    Filesize

    2.0MB