Analysis

  • max time kernel
    36s
  • max time network
    14s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/07/2024, 21:40

General

  • Target

    a9e92b03708754ce1e1c393eb2f27b717ae2e22de36681c7e3c84fb012a1b8b0.xls

  • Size

    144KB

  • MD5

    6dd8d4e014e89cd78217d90e544709da

  • SHA1

    a21a38a27d1ef97d6e76d67fa3c8556a24c1efbe

  • SHA256

    a9e92b03708754ce1e1c393eb2f27b717ae2e22de36681c7e3c84fb012a1b8b0

  • SHA512

    e3db082d41673736e36b180485f7f74f8386ff2035928c3ec97f941efc564c5849ca1b0376eadf6fb4886550c8548e6d8d57ba64e77a6ba784bb994eed852191

  • SSDEEP

    3072:dwxEtjPOtioVjDGUU1qfDlaGGx+jDYIxcGwY7A80iO2c2aHTTQfWw8TEk+GlOpv/:SxEtjPOtioVjDGUU1qfDlavx+fYIxRJ+

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a9e92b03708754ce1e1c393eb2f27b717ae2e22de36681c7e3c84fb012a1b8b0.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4092-0-0x00007FF9DA0D0000-0x00007FF9DA0E0000-memory.dmp

    Filesize

    64KB

  • memory/4092-2-0x00007FF9DA0D0000-0x00007FF9DA0E0000-memory.dmp

    Filesize

    64KB

  • memory/4092-1-0x00007FF9DA0D0000-0x00007FF9DA0E0000-memory.dmp

    Filesize

    64KB

  • memory/4092-4-0x00007FF9DA0D0000-0x00007FF9DA0E0000-memory.dmp

    Filesize

    64KB

  • memory/4092-3-0x00007FF9DA0D0000-0x00007FF9DA0E0000-memory.dmp

    Filesize

    64KB

  • memory/4092-5-0x00007FFA1A0ED000-0x00007FFA1A0EE000-memory.dmp

    Filesize

    4KB

  • memory/4092-9-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-8-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-7-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-11-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-12-0x00007FF9D7D50000-0x00007FF9D7D60000-memory.dmp

    Filesize

    64KB

  • memory/4092-10-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-6-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-13-0x00007FF9D7D50000-0x00007FF9D7D60000-memory.dmp

    Filesize

    64KB

  • memory/4092-15-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-14-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-17-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-21-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-23-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-22-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-20-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-19-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-18-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-16-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB

  • memory/4092-29-0x00007FFA1A050000-0x00007FFA1A245000-memory.dmp

    Filesize

    2.0MB