Analysis

  • max time kernel
    141s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 23:12

General

  • Target

    C71-BA-5855-20-DS-003_D.xlsx

  • Size

    358KB

  • MD5

    9a77d8b9fdf76c8d459eb5fecef0fb83

  • SHA1

    d855e29c67a71311bacacc810537752cfb2d52d2

  • SHA256

    372ba89820269d2349e4381a7f4e125dfa82e7b9f0589c0385c9889c7c6ec3c7

  • SHA512

    33cc323f6209e037f3e97b127a362120e7b5b3ba0a6be1c230e87232e01d415e20f6a0cddbde7da432b343dd0d9b610e6b938df3fc506e3ae3519fac233788a9

  • SSDEEP

    6144:Onx1D+QTNF5IpmlMffBe1iQmS8uacw3h8T2I+UL4665Axz0A883:Ux9+4NFapfBe1iQmS8BcnT21AxK83

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\C71-BA-5855-20-DS-003_D.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1004
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4052
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:2820

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

              Filesize

              2KB

              MD5

              ce68dcc4188e75b31e4e9b66e015bdc2

              SHA1

              7f6363ff0202da0b61069ffca8d07920d9656eac

              SHA256

              e5a7825134f9bf203de5244c9a07e68f4b761895bee56e998e3303f12cb71b77

              SHA512

              28f8129bddc0ebc78ae1ef46cadba593d4076fcd30ac079371d8e82e6fa4079ce0c7981983642213e4af1cb2358b418ae96bbfe02ee5b350f61aecab5598a390

            • memory/1004-13-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-61-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-2-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-4-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-15-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-5-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-7-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-9-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-10-0x00007FFE6BCF0000-0x00007FFE6BD00000-memory.dmp

              Filesize

              64KB

            • memory/1004-8-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-11-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-12-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-3-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-14-0x00007FFE6BCF0000-0x00007FFE6BD00000-memory.dmp

              Filesize

              64KB

            • memory/1004-6-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-18-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-17-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-16-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-28-0x00007FFEADECD000-0x00007FFEADECE000-memory.dmp

              Filesize

              4KB

            • memory/1004-29-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-30-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-31-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB

            • memory/1004-1-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-0-0x00007FFEADECD000-0x00007FFEADECE000-memory.dmp

              Filesize

              4KB

            • memory/1004-62-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-63-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-64-0x00007FFE6DEB0000-0x00007FFE6DEC0000-memory.dmp

              Filesize

              64KB

            • memory/1004-65-0x00007FFEADE30000-0x00007FFEAE025000-memory.dmp

              Filesize

              2.0MB