Analysis

  • max time kernel
    46s
  • max time network
    33s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240730-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-08-2024 21:05

General

  • Target

    010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8.xlsm

  • Size

    91KB

  • MD5

    509857acc05ae88ee28adb2e0da66a99

  • SHA1

    44cf9ef2568ec1a6b17ac3a51cfd6fd847d90014

  • SHA256

    010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8

  • SHA512

    37b03d09221b4f25208639662b2b2b84e3ebdb8201b098fab6be8f8a7c775453c11d82a5d68f85dbbd4223b5475b16ea0b3201677cdf9d29e126aef59463ad35

  • SSDEEP

    1536:CguZCa6S5khUI5yRsKxHaH4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYII0mFg:CgugapkhlaxH2aPjpM+d/Ms8ULavLcjr

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1280

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    5e83b394a15ee9b3677387e30d80eb5c

    SHA1

    3bc5149b1de3e7b7de42eaed074bb351a466290e

    SHA256

    e55062810075aa62219ddfb529356be922bf41a34d653057b780b93f6080b342

    SHA512

    cbcd565fffa7ee3550c12cf4278aa152a6a315265f43caffcecfdd8ad470a894dc9a8be122308574c268d729009d826cd5d6355689a82cf93db202522121f312

  • memory/1280-7-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-9-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-6-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-2-0x00007FFD69E50000-0x00007FFD69E60000-memory.dmp

    Filesize

    64KB

  • memory/1280-5-0x00007FFDA9E6D000-0x00007FFDA9E6E000-memory.dmp

    Filesize

    4KB

  • memory/1280-10-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-8-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-12-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-3-0x00007FFD69E50000-0x00007FFD69E60000-memory.dmp

    Filesize

    64KB

  • memory/1280-4-0x00007FFD69E50000-0x00007FFD69E60000-memory.dmp

    Filesize

    64KB

  • memory/1280-0-0x00007FFD69E50000-0x00007FFD69E60000-memory.dmp

    Filesize

    64KB

  • memory/1280-11-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-13-0x00007FFD67B40000-0x00007FFD67B50000-memory.dmp

    Filesize

    64KB

  • memory/1280-14-0x00007FFD67B40000-0x00007FFD67B50000-memory.dmp

    Filesize

    64KB

  • memory/1280-62-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/1280-1-0x00007FFD69E50000-0x00007FFD69E60000-memory.dmp

    Filesize

    64KB

  • memory/1280-148-0x00007FFDA9DD0000-0x00007FFDA9FC5000-memory.dmp

    Filesize

    2.0MB