Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
22/08/2024, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
-copia.xlsx
Resource
win7-20240705-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
-copia.xlsx
Resource
win10-20240404-en
4 signatures
150 seconds
General
-
Target
-copia.xlsx
-
Size
719KB
-
MD5
8d9b4b0cbe5e6d570367d929b088e7a6
-
SHA1
4c276514f25b7e993761a2fdf7ebdbdca8b331da
-
SHA256
f196b60032d96ed748469f9c3d59ef60a686d28541714ad2d49b8938feb77a3b
-
SHA512
2b2ea73ea570680d08ca1b6077fbffa504f5684b526c46a60b8bc789fba8f9252157ee0a3c01f894a27029b09e19ee8748dd2499e86870f08d675efef99df58c
-
SSDEEP
12288:r8vrJ0d6trHdlzni91+PjeTcIGpSlT/+X+xXoAEObjJ//kEUV0S1D7M24xg4Jz:ot0dm3riL+TIGpaTlxXoAxcEUtDLMrz
Score
3/10
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2756 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2756 EXCEL.EXE 2756 EXCEL.EXE 2756 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\-copia.xlsx1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2756