Analysis

  • max time kernel
    46s
  • max time network
    34s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 21:12

General

  • Target

    ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30.xlsm

  • Size

    92KB

  • MD5

    f56b84d200e6f3ddf6bc8cdcbb7d428c

  • SHA1

    1fe08a2578fcb52d4f552412303ec239ad3e5c97

  • SHA256

    ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30

  • SHA512

    1d18f43f9bf5a3e957511dfd0203e8c5782178d795111369f1543c550cbef4003ab47e2c8b205e21261f8709d5dd056bb3fab13441790e63dd3c3e09450e00cf

  • SSDEEP

    1536:CguZCa6S5khUIBiPxJf0gdY34znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYIIZ:CgugapkhlBiPP0gdY3aPjpqxvD/Ms8UA

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2732

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          3KB

          MD5

          bc9ee1ef127b2f764dd6292f1ca96d5b

          SHA1

          902dc6ed57e752ffa732ce2af635418f1d3e7b23

          SHA256

          f00e1096b7901e0323b258c4fa068d8fe04574309ccd2e19076c8217c80268c1

          SHA512

          0ebea05d1b40f57ff2225117eacd56acee1c8ddc1e1f8b22cea89794305dc71bbc52a9239bd11cbbd8cee6e087fe1d68419d52cdb40054fe4fd8693d8d58ea94

        • memory/2732-14-0x00007FFD2EBF0000-0x00007FFD2EC00000-memory.dmp

          Filesize

          64KB

        • memory/2732-150-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-4-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

          Filesize

          64KB

        • memory/2732-2-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

          Filesize

          64KB

        • memory/2732-6-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-5-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-7-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

          Filesize

          64KB

        • memory/2732-10-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-12-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-11-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-9-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-13-0x00007FFD2EBF0000-0x00007FFD2EC00000-memory.dmp

          Filesize

          64KB

        • memory/2732-8-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-0-0x00007FFD7132D000-0x00007FFD7132E000-memory.dmp

          Filesize

          4KB

        • memory/2732-3-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

          Filesize

          64KB

        • memory/2732-67-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-16-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-127-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-144-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-15-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-151-0x00007FFD7132D000-0x00007FFD7132E000-memory.dmp

          Filesize

          4KB

        • memory/2732-152-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-153-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-154-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-155-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-156-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-160-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-161-0x00007FFD71290000-0x00007FFD71485000-memory.dmp

          Filesize

          2.0MB

        • memory/2732-1-0x00007FFD31310000-0x00007FFD31320000-memory.dmp

          Filesize

          64KB