Analysis

  • max time kernel
    54s
  • max time network
    56s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/08/2024, 22:03

General

  • Target

    cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c.xlsm

  • Size

    92KB

  • MD5

    e8362f4eeb7876aaadc295163a620f41

  • SHA1

    268a98c161b1ae1ed9ef1825914c03e7606f0933

  • SHA256

    cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c

  • SHA512

    32de0ef99820e15d0a59261b4a8ef6c58d086a3b7702f1d36701fde82c2bb38102839e40fe79ffa8d7e420b8df1cc7080031d87c63094377ad919ad749236550

  • SSDEEP

    1536:CguZCa6S5khUINVpidxZz4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIVFc:CgugapkhlNKdDzaPjpM+d/Ms8ULavLcz

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3112
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1020,i,11708048364682646792,608099842549576907,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:8
    1⤵
      PID:4980

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

            Filesize

            1KB

            MD5

            3d74a9dae7cd3100ca9cf525bdb5084d

            SHA1

            bf96354561190178272f3cce58b6c313c925f87e

            SHA256

            84fa7ebb177a0250b22b754512b9be22b94289974fed9479f1ef2a081ef9d249

            SHA512

            b0ed081250d0872dd1dd482ab6f0745b9323fadb74494e5ccec723e5fdd3278fb15105c97a3e58267c3ff9baec98a476a329df7668a5004b4c0d2c9f039d2c01

          • memory/3112-13-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-8-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-4-0x00007FF843C90000-0x00007FF843CA0000-memory.dmp

            Filesize

            64KB

          • memory/3112-2-0x00007FF843C90000-0x00007FF843CA0000-memory.dmp

            Filesize

            64KB

          • memory/3112-6-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-7-0x00007FF843C90000-0x00007FF843CA0000-memory.dmp

            Filesize

            64KB

          • memory/3112-5-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-15-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-1-0x00007FF883CAD000-0x00007FF883CAE000-memory.dmp

            Filesize

            4KB

          • memory/3112-10-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-3-0x00007FF843C90000-0x00007FF843CA0000-memory.dmp

            Filesize

            64KB

          • memory/3112-11-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-9-0x00007FF841B90000-0x00007FF841BA0000-memory.dmp

            Filesize

            64KB

          • memory/3112-16-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-14-0x00007FF841B90000-0x00007FF841BA0000-memory.dmp

            Filesize

            64KB

          • memory/3112-12-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-64-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-150-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-151-0x00007FF883CAD000-0x00007FF883CAE000-memory.dmp

            Filesize

            4KB

          • memory/3112-152-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-153-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-157-0x00007FF883C10000-0x00007FF883E05000-memory.dmp

            Filesize

            2.0MB

          • memory/3112-0-0x00007FF843C90000-0x00007FF843CA0000-memory.dmp

            Filesize

            64KB