Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 22:04
Behavioral task
behavioral1
Sample
3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2.xls
Resource
win10v2004-20240709-en
General
-
Target
3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2.xls
-
Size
61KB
-
MD5
7ba210d9e053a62940c7c00a54a0be39
-
SHA1
1e0b73f76fb59a4f31b459f601aed6ad1ff0d85e
-
SHA256
3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2
-
SHA512
2eb9cf4adcd6ac17d4893d9bcb2055aede59a7721954dc790e328dfd52cd50adc3d9e209628a24f63d9f53fd306417a3fbb928f012155a02add18777f26c4acf
-
SSDEEP
1536:viok3hbdlylKsgwyzcTbWhZFGkE+cLaxHAyfMuk2rxY/kJVTpc:vrk3hbdlylKsgwyzcTbWhZFGkE+cLaxP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 724 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE 724 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:724
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize4KB
MD5ff9ebe2a4c681aa5529387cade0a8c67
SHA1a1481f8167208cfa2d96794f70d0ac723791edae
SHA256e38a42509e75790dae0ce7a58ad26b73d258d455c64c9f91b50c7e3e54758bbd
SHA5128e76a88c876e785fc9577fb1f47e7ee08bcfe5aec2606b835ef3f53f3f59bef8220f647e60d22b1ef4307e9576f5ed6fe651d30c97581cbed3e17cc1234b75f4