Analysis
-
max time kernel
100s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
24-07-2024 01:30
Static task
static1
Behavioral task
behavioral1
Sample
7288f4d26becdb97def6fec4c630f4cb7ecb3c828c119f14e1ce71798dd3fff5.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7288f4d26becdb97def6fec4c630f4cb7ecb3c828c119f14e1ce71798dd3fff5.xls
Resource
win10v2004-20240709-en
General
-
Target
7288f4d26becdb97def6fec4c630f4cb7ecb3c828c119f14e1ce71798dd3fff5.xls
-
Size
994KB
-
MD5
5820ae3a212acd62b4f91c5761e131d3
-
SHA1
a78113c2bb403d5dce695471f78d7fe560be1a9e
-
SHA256
7288f4d26becdb97def6fec4c630f4cb7ecb3c828c119f14e1ce71798dd3fff5
-
SHA512
5ea53f66b33d7674ba727d6a40fed8a09fcf15e38ec71352fbd31887289aa8a0d8687d285789ca3fff71f393c4c1c7f3a01823a648d3740c03330f3df3fe22b0
-
SSDEEP
24576:a9mdlOatTg/cQsO4lkTtp4vAo2nYCm0G5PSDqVQT:akdlOatTnHlZAtnet5PSDZ
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1984 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1984 EXCEL.EXE 1984 EXCEL.EXE 1984 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\7288f4d26becdb97def6fec4c630f4cb7ecb3c828c119f14e1ce71798dd3fff5.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1984