Analysis
-
max time kernel
24s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06-08-2024 22:13
Behavioral task
behavioral1
Sample
159bbf20977f80289e54d468f1c240cfec079a6df6e279e024b3ff406a0acd58.xls
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
159bbf20977f80289e54d468f1c240cfec079a6df6e279e024b3ff406a0acd58.xls
Resource
win10v2004-20240802-en
General
-
Target
159bbf20977f80289e54d468f1c240cfec079a6df6e279e024b3ff406a0acd58.xls
-
Size
6.7MB
-
MD5
b1f779ce36012c743c370ad44be3b709
-
SHA1
bb428956aaa17e96e47902e1a243cf8ab8d151ab
-
SHA256
159bbf20977f80289e54d468f1c240cfec079a6df6e279e024b3ff406a0acd58
-
SHA512
ed05f9167a288ade3a829ce77c034e0b31d6abe83e886fdebb4e3e592127ba547a4d2bd6e03c4f04cfacb94c962c31f61f1950e41801cc3d6c00cede29ae5134
-
SSDEEP
196608:Fw6RUj6CQQzFpsj/j1/WkxLRDUp9IsfPHz7D3qfk:Fw6R1CPps9Og1DUp9IsfCk
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1864 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1864 EXCEL.EXE 1864 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1864 EXCEL.EXE 1864 EXCEL.EXE 1864 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2876 1864 EXCEL.EXE 31 PID 1864 wrote to memory of 2876 1864 EXCEL.EXE 31 PID 1864 wrote to memory of 2876 1864 EXCEL.EXE 31 PID 1864 wrote to memory of 2876 1864 EXCEL.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\159bbf20977f80289e54d468f1c240cfec079a6df6e279e024b3ff406a0acd58.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2876
-