Analysis
-
max time kernel
49s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 21:52
Static task
static1
Behavioral task
behavioral1
Sample
0cef678bdd35846330c9e78535e515362e977ff33be8ad1d51758a6ba6cccf7e.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0cef678bdd35846330c9e78535e515362e977ff33be8ad1d51758a6ba6cccf7e.xls
Resource
win10v2004-20240226-en
General
-
Target
0cef678bdd35846330c9e78535e515362e977ff33be8ad1d51758a6ba6cccf7e.xls
-
Size
1.1MB
-
MD5
a4affb65fb1cc8d8a69fad11a739ff96
-
SHA1
e943117ca1640a42acae27b10a1b9a7b87c36b14
-
SHA256
0cef678bdd35846330c9e78535e515362e977ff33be8ad1d51758a6ba6cccf7e
-
SHA512
3d2d29f6ef24509b125be9f3b12a7d9567e7c57c545e68b414e999200bd2cf51337d76de8ee8cf0e4b4ff788bb91309b441c1f64267783e3ab4addab787fe627
-
SSDEEP
12288:THlhouZAzb8KplK8LhjeqS9y5qKiVUtmNrZiWyqJ58p3VNhB0SDY22JsdmcF:THQuev8KlK8LhjeqS9y5qKmUMNr/5+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1848 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1848 EXCEL.EXE 1848 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE 1848 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0cef678bdd35846330c9e78535e515362e977ff33be8ad1d51758a6ba6cccf7e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1848
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4832 --field-trial-handle=2244,i,11878111470816612087,2265290141962607370,262144 --variations-seed-version /prefetch:81⤵PID:1128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD512a2cc01237adbabc8c5378a30389571
SHA1098a84243ad7e0d2e4ac484a4e666c482cd41375
SHA256b426b49e4ac38253a600a06c9da1532830b42e8a44175da068f7406447259fac
SHA51219318d65c66d8eed758c770d4a43ae63de875bae4c9c415e56ef7745c06e7890edda1e4412261851ebdd628737efd8cc3033bbd5f63206578a21bf9d91f5f827
-
Filesize
256B
MD5c6b1a5f0fabb13661274b6680a92fb51
SHA1fb4f7039b2ebec3cb4437d95d522525294cadccc
SHA2563187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1
SHA51225138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221