Analysis
-
max time kernel
141s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/08/2024, 23:12
Static task
static1
Behavioral task
behavioral1
Sample
C71-BA-5855-20-DS-003_D.xlsx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
C71-BA-5855-20-DS-003_D.xlsx
Resource
win10v2004-20240802-en
General
-
Target
C71-BA-5855-20-DS-003_D.xlsx
-
Size
358KB
-
MD5
9a77d8b9fdf76c8d459eb5fecef0fb83
-
SHA1
d855e29c67a71311bacacc810537752cfb2d52d2
-
SHA256
372ba89820269d2349e4381a7f4e125dfa82e7b9f0589c0385c9889c7c6ec3c7
-
SHA512
33cc323f6209e037f3e97b127a362120e7b5b3ba0a6be1c230e87232e01d415e20f6a0cddbde7da432b343dd0d9b610e6b938df3fc506e3ae3519fac233788a9
-
SSDEEP
6144:Onx1D+QTNF5IpmlMffBe1iQmS8uacw3h8T2I+UL4665Axz0A883:Ux9+4NFapfBe1iQmS8BcnT21AxK83
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1004 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE 1004 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1004 wrote to memory of 4052 1004 EXCEL.EXE 95 PID 1004 wrote to memory of 4052 1004 EXCEL.EXE 95
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\C71-BA-5855-20-DS-003_D.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4052
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2820
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5ce68dcc4188e75b31e4e9b66e015bdc2
SHA17f6363ff0202da0b61069ffca8d07920d9656eac
SHA256e5a7825134f9bf203de5244c9a07e68f4b761895bee56e998e3303f12cb71b77
SHA51228f8129bddc0ebc78ae1ef46cadba593d4076fcd30ac079371d8e82e6fa4079ce0c7981983642213e4af1cb2358b418ae96bbfe02ee5b350f61aecab5598a390