Analysis

  • max time kernel
    44s
  • max time network
    54s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-06-2024 21:05

General

  • Target

    e82a74e336e5e8ef926d96b6d86098542524a14c0b549baee5075e6bb9737728.xlsm

  • Size

    92KB

  • MD5

    56174c38058f9800bf888335a67b816c

  • SHA1

    735c69f3e55c3af7767187cfb6f3d1874d411b89

  • SHA256

    e82a74e336e5e8ef926d96b6d86098542524a14c0b549baee5075e6bb9737728

  • SHA512

    3378c66a04f68331acb837d272a6d68ec691870de2c4bf96e1e09734216a0880b9d519c6a3fa345cc41e39ee1020f524361041836a62d76ce04ba80053354c93

  • SSDEEP

    1536:CguZCa6S5khUI3Ne1k4b4znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYII5Fme:Cgugapkhl3I1hbaPjpqxvD/Ms8ULavLl

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e82a74e336e5e8ef926d96b6d86098542524a14c0b549baee5075e6bb9737728.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:452

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/452-6-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-5-0x00007FFA9336D000-0x00007FFA9336E000-memory.dmp

    Filesize

    4KB

  • memory/452-10-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-9-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-13-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-12-0x00007FFA509F0000-0x00007FFA50A00000-memory.dmp

    Filesize

    64KB

  • memory/452-11-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-15-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-14-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-19-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-18-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-17-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-20-0x00007FFA509F0000-0x00007FFA50A00000-memory.dmp

    Filesize

    64KB

  • memory/452-22-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-21-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-16-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-8-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-7-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB

  • memory/452-4-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/452-3-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/452-2-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/452-1-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/452-0-0x00007FFA53350000-0x00007FFA53360000-memory.dmp

    Filesize

    64KB

  • memory/452-131-0x00007FFA932D0000-0x00007FFA934C5000-memory.dmp

    Filesize

    2.0MB