Analysis

  • max time kernel
    46s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/07/2024, 22:04

General

  • Target

    3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2.xls

  • Size

    61KB

  • MD5

    7ba210d9e053a62940c7c00a54a0be39

  • SHA1

    1e0b73f76fb59a4f31b459f601aed6ad1ff0d85e

  • SHA256

    3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2

  • SHA512

    2eb9cf4adcd6ac17d4893d9bcb2055aede59a7721954dc790e328dfd52cd50adc3d9e209628a24f63d9f53fd306417a3fbb928f012155a02add18777f26c4acf

  • SSDEEP

    1536:viok3hbdlylKsgwyzcTbWhZFGkE+cLaxHAyfMuk2rxY/kJVTpc:vrk3hbdlylKsgwyzcTbWhZFGkE+cLaxP

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3b9713c0480120f048a0cbbefc0a99dc8b61e188221488be2e1171bddd4451a2.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:724

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    4KB

    MD5

    ff9ebe2a4c681aa5529387cade0a8c67

    SHA1

    a1481f8167208cfa2d96794f70d0ac723791edae

    SHA256

    e38a42509e75790dae0ce7a58ad26b73d258d455c64c9f91b50c7e3e54758bbd

    SHA512

    8e76a88c876e785fc9577fb1f47e7ee08bcfe5aec2606b835ef3f53f3f59bef8220f647e60d22b1ef4307e9576f5ed6fe651d30c97581cbed3e17cc1234b75f4

  • memory/724-10-0x00007FFEE53E0000-0x00007FFEE53F0000-memory.dmp

    Filesize

    64KB

  • memory/724-11-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-1-0x00007FFEE7530000-0x00007FFEE7540000-memory.dmp

    Filesize

    64KB

  • memory/724-5-0x00007FFF2754D000-0x00007FFF2754E000-memory.dmp

    Filesize

    4KB

  • memory/724-4-0x00007FFEE7530000-0x00007FFEE7540000-memory.dmp

    Filesize

    64KB

  • memory/724-6-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-9-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-8-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-7-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-0-0x00007FFEE7530000-0x00007FFEE7540000-memory.dmp

    Filesize

    64KB

  • memory/724-3-0x00007FFEE7530000-0x00007FFEE7540000-memory.dmp

    Filesize

    64KB

  • memory/724-13-0x00007FFEE53E0000-0x00007FFEE53F0000-memory.dmp

    Filesize

    64KB

  • memory/724-12-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-24-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-26-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-27-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-25-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-23-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-2-0x00007FFEE7530000-0x00007FFEE7540000-memory.dmp

    Filesize

    64KB

  • memory/724-44-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB

  • memory/724-45-0x00007FFF274B0000-0x00007FFF276A5000-memory.dmp

    Filesize

    2.0MB