Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
Quotation Request for Outdoor Electrical Panels.eml
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Quotation Request for Outdoor Electrical Panels.eml
Resource
win10v2004-20240730-en
Behavioral task
behavioral3
Sample
Electrical Boards Panels BoQ.xlsx
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
Electrical Boards Panels BoQ.xlsx
Resource
win10v2004-20240730-en
General
-
Target
Electrical Boards Panels BoQ.xlsx
-
Size
35KB
-
MD5
555ed2ea533e0196d0e91005a951aa09
-
SHA1
e13b34f907df358d304be28fc0ce094e4bbda7db
-
SHA256
8bfaad49dd772f6426a923122a900ed70d46d9a850a81234799ce044b8967923
-
SHA512
5a970bee6d643a237f27dbcf03289aef274c2aaba8e3cd72c593993296cdf6fb7e8a74b29ab4c8c33f5c7cc494a208d9bc116a68ea4e9283dcb8e424f1269550
-
SSDEEP
768:t3eeobQOWWTpsgMHx3If4CSxH+mwXFuax:t3TobQTWtsgMRY4omi5
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Electrical Boards Panels BoQ.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:628
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize682B
MD582695ad9bd55c9dcc99821687ce9e9c6
SHA169bc750d40b63b8d0b4fa245257c29c75f3a3674
SHA256fc31fa9391d116fefd461ababff8690213ebe585b2fd569f84ea983102923eff
SHA512e69541c123aee00db62b1c599e5eaf3947aaaf5061d8706d49df64867647c5c348bf756d88a813adb2a120173b336a34737adef8e4e6b8d380dfa491ed4e049b