Analysis

  • max time kernel
    46s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:28

General

  • Target

    a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea.xlsm

  • Size

    92KB

  • MD5

    98996f86c1c26721e20ab6645661a6b8

  • SHA1

    5199ab6d7d7458f2b4be4ad15504a360a559fd0c

  • SHA256

    a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea

  • SHA512

    88311923fc81a67d25a0938c223422fc91c69f9c6c7a57cb5b04f40d64583f57fb49980be7b5964487f1cb452d9aa014aa3629f092dd4f22641fa872eca611af

  • SSDEEP

    1536:CguZCa6S5khUIOVpL7mxB4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIeFB:CgugapkhlOVx7mxBaPjpM+d/Ms8ULav6

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    683B

    MD5

    6fcbd0fe089dfa001513e63bb39542b9

    SHA1

    4a0044d96bc609c5b56e6390fe27eedc4eb8c25f

    SHA256

    57caa02e3ddb418334a22995c2872f22141dc0544485db0cb53386d5f681f3f1

    SHA512

    e584fdbf1871ca9cab6a157053068c90c87e6e0f98ba655c5989dd5106aae891b01f13fa7e6b34cc85f6a63a7029b7b0549dcbf03a8e0d4ced22606cd9f7441f

  • memory/2052-15-0x00007FFB9E370000-0x00007FFB9E380000-memory.dmp

    Filesize

    64KB

  • memory/2052-157-0x00007FFBE080D000-0x00007FFBE080E000-memory.dmp

    Filesize

    4KB

  • memory/2052-3-0x00007FFBA07F0000-0x00007FFBA0800000-memory.dmp

    Filesize

    64KB

  • memory/2052-5-0x00007FFBA07F0000-0x00007FFBA0800000-memory.dmp

    Filesize

    64KB

  • memory/2052-7-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-9-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-10-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-8-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-11-0x00007FFB9E370000-0x00007FFB9E380000-memory.dmp

    Filesize

    64KB

  • memory/2052-6-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-12-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-4-0x00007FFBA07F0000-0x00007FFBA0800000-memory.dmp

    Filesize

    64KB

  • memory/2052-159-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-2-0x00007FFBA07F0000-0x00007FFBA0800000-memory.dmp

    Filesize

    64KB

  • memory/2052-22-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-18-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-19-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-21-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-17-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-20-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-16-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-13-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-68-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-0-0x00007FFBA07F0000-0x00007FFBA0800000-memory.dmp

    Filesize

    64KB

  • memory/2052-156-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-1-0x00007FFBE080D000-0x00007FFBE080E000-memory.dmp

    Filesize

    4KB

  • memory/2052-158-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB

  • memory/2052-14-0x00007FFBE0770000-0x00007FFBE0965000-memory.dmp

    Filesize

    2.0MB