Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
20-08-2024 23:12
Static task
static1
Behavioral task
behavioral1
Sample
C71-BA-5855-20-DS-003_D.xlsx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
C71-BA-5855-20-DS-003_D.xlsx
Resource
win10v2004-20240802-en
General
-
Target
C71-BA-5855-20-DS-003_D.xlsx
-
Size
358KB
-
MD5
9a77d8b9fdf76c8d459eb5fecef0fb83
-
SHA1
d855e29c67a71311bacacc810537752cfb2d52d2
-
SHA256
372ba89820269d2349e4381a7f4e125dfa82e7b9f0589c0385c9889c7c6ec3c7
-
SHA512
33cc323f6209e037f3e97b127a362120e7b5b3ba0a6be1c230e87232e01d415e20f6a0cddbde7da432b343dd0d9b610e6b938df3fc506e3ae3519fac233788a9
-
SSDEEP
6144:Onx1D+QTNF5IpmlMffBe1iQmS8uacw3h8T2I+UL4665Axz0A883:Ux9+4NFapfBe1iQmS8BcnT21AxK83
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2104 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2104 EXCEL.EXE 2104 EXCEL.EXE 2104 EXCEL.EXE 2104 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2256 2104 EXCEL.EXE 31 PID 2104 wrote to memory of 2256 2104 EXCEL.EXE 31 PID 2104 wrote to memory of 2256 2104 EXCEL.EXE 31 PID 2104 wrote to memory of 2256 2104 EXCEL.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\C71-BA-5855-20-DS-003_D.xlsx1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2256
-