Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 10:29
Static task
static1
Behavioral task
behavioral1
Sample
f2a850293133ccee129e795526f95e3f536470194f00ba841a274139063c3f9d.xls
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
f2a850293133ccee129e795526f95e3f536470194f00ba841a274139063c3f9d.xls
Resource
win10v2004-20240802-en
General
-
Target
f2a850293133ccee129e795526f95e3f536470194f00ba841a274139063c3f9d.xls
-
Size
483KB
-
MD5
349a2bebf46a38b10c0689c4ba2b140e
-
SHA1
a40af4b4ff4c4b81a85823ea27c815bf32e73f76
-
SHA256
f2a850293133ccee129e795526f95e3f536470194f00ba841a274139063c3f9d
-
SHA512
ef80ca6235c10fc144d99dac527fe1f92c983fb5326de584d7edd2582acf38938cad62181319665d24244ea44c3bcc4f11b828030db5075ae7ddfa735c816545
-
SSDEEP
6144:KctFVeR6REvOoLpn3OdEaUQxs8mKQmljsz7ltfYA7N3dfgPBQ2YwRe2s7MrhCNcc:5VeMEvZpeEtJEl8tfdNaPmHu4Nlv7x
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4376 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE 4376 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f2a850293133ccee129e795526f95e3f536470194f00ba841a274139063c3f9d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5cf6720894eb33e41fe19bd48f724a848
SHA1b5fc92fff885348d417ab4bfe166a3a381a27723
SHA25616dd9fcf281a26a9198c848a8e64c2afdf3c8aad966a1ade6b8166b6e309d439
SHA512d5d40fbdcb33c8cb37a6a4f97f3c4fe7633c7dec3499e8c646bd7dfe31961eeba348350e533303a40eb166a87ae050bbdf99d3a3d9c7359acc8327dfaff8e558