Analysis
-
max time kernel
47s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-08-2024 21:31
Behavioral task
behavioral1
Sample
a2e086d1e52951f9635b38ef39cd7d3270eba3e010d459259f63fe4ef7fadc7e.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a2e086d1e52951f9635b38ef39cd7d3270eba3e010d459259f63fe4ef7fadc7e.xls
Resource
win10v2004-20240802-en
General
-
Target
a2e086d1e52951f9635b38ef39cd7d3270eba3e010d459259f63fe4ef7fadc7e.xls
-
Size
35KB
-
MD5
b8a73a24a848649b3e0d9324e88c6e11
-
SHA1
a92491d317ff09d73e3f10dc8b3122654b573c01
-
SHA256
a2e086d1e52951f9635b38ef39cd7d3270eba3e010d459259f63fe4ef7fadc7e
-
SHA512
72bdd58eab4366bdd1093f806b4e6ae9dfad06bba436c99eccb79c5c6a84d1147596df796d0009c366854d7767d7c9efd165a42ba909d9f1f330928aca9081ad
-
SSDEEP
768:PmvdpQxk3hOdsylKlgxopeiBNhZFGzE+cLULglnAuWQ/qQyYiNJn3Xza864:pk3hOdsylKlgxopeiBNhZFGzE+cLULgk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3208 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE 3208 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a2e086d1e52951f9635b38ef39cd7d3270eba3e010d459259f63fe4ef7fadc7e.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3208
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD54f3838c238bd9a2d910b98a327b448cc
SHA123e019fe2e94aa616f0814f4e9f84d59750347d5
SHA256a382dea6c922515a6d4ce3653b4f421d4a011385b8b663b96e7f3b4ccf6d9eee
SHA5120594164a65da6887926fb6090c02365daeb45087b5538707fbea14befc08255dd0a1df17f283fc97ad3adf74e56587122a042fd62620d1691a083541c565edb8