Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 06:46

General

  • Target

    n.xls

  • Size

    665KB

  • MD5

    15466f2c3f1dda81e899cd3e039a7e94

  • SHA1

    caba9951dde530c9414ddffeb2531108ec1a160d

  • SHA256

    5289c379b32cd2bf44f3143b62559eb26a60cc590705b96a0c49864ed5b67039

  • SHA512

    b7043a6f1262799784b93ad8cd7da688896b5993e8306bb57b535a0f260ba401884c8816dd49c15d104def8d868395987d7f34db648801a89218d50551e22594

  • SSDEEP

    12288:E3KJ32k9GHRTCPhPaurAXB1/8ftCF0a3vidhfVWHHYJj/PUTkK9TSNSNRLCH3sEr:Ei92IpdAxB8AKse0HYZ/PqDcSO33

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\n.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4656

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          1KB

          MD5

          30480b8b0ea895d509330226cd373d19

          SHA1

          cfdbc3149ac570bb2bf8fffb33b63a6e8cad375b

          SHA256

          fe99d88a2a669604ef6d005d4004bbfc54398be3a9362fd91c3f03fc7621471a

          SHA512

          9426b47ef0c429faaf57c10115ea16a73e17bc7fbcbad2e879705cd7f68c703451e99a4b7bf09a25c6ba37206115c1c2507b89d2af7739d80617057c558f6d5f

        • memory/4656-11-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-13-0x00007FF84FE90000-0x00007FF84FEA0000-memory.dmp

          Filesize

          64KB

        • memory/4656-2-0x00007FF852510000-0x00007FF852520000-memory.dmp

          Filesize

          64KB

        • memory/4656-5-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-6-0x00007FF852510000-0x00007FF852520000-memory.dmp

          Filesize

          64KB

        • memory/4656-4-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-7-0x00007FF852510000-0x00007FF852520000-memory.dmp

          Filesize

          64KB

        • memory/4656-9-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-8-0x00007FF84FE90000-0x00007FF84FEA0000-memory.dmp

          Filesize

          64KB

        • memory/4656-17-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-3-0x00007FF852510000-0x00007FF852520000-memory.dmp

          Filesize

          64KB

        • memory/4656-10-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-1-0x00007FF89252D000-0x00007FF89252E000-memory.dmp

          Filesize

          4KB

        • memory/4656-16-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-15-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-14-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-12-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-35-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-36-0x00007FF89252D000-0x00007FF89252E000-memory.dmp

          Filesize

          4KB

        • memory/4656-37-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-38-0x00007FF892490000-0x00007FF892685000-memory.dmp

          Filesize

          2.0MB

        • memory/4656-0-0x00007FF852510000-0x00007FF852520000-memory.dmp

          Filesize

          64KB