Analysis

  • max time kernel
    46s
  • max time network
    37s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-08-2024 21:14

General

  • Target

    845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e.xlsm

  • Size

    151KB

  • MD5

    8c5e461350c0146f8931ff9e38ab7d7b

  • SHA1

    fcba480fe7abe421203dad3dcaaaec8994771066

  • SHA256

    845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e

  • SHA512

    f9b54d507cf518e13fb061f456ca21f645388a3e807243d17743b10b81b997e9a7f889dcffcf304f57a39c9674d83b68b3456703e9a1b7ac1033d56a4524594a

  • SSDEEP

    1536:MFIYe0yJyriy/kEbrogaY6FtkVSwm7c22e1vmLomjqmQcW44N+:kIYVriuVHNItLF1v07LQcW44N+

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5VLNVQUATI9FLRH26RYK.temp

    Filesize

    1KB

    MD5

    b6f25b907bf395aa418c1c03ee978522

    SHA1

    ee97a3f5221916c7d5927942ed66dcd65d9b0579

    SHA256

    28597e0cec6f29cc47b7def5a8651e3aafd964ebe4a80446f061022a37a680e3

    SHA512

    3bb24d282257d3c55b11943cb3e5261711437a08ec616a581263ce0b1744925d5d96d75ddef60e530efdf77584ffaa668173a9b4fae35e7eba5775e4121e1d2b

  • memory/2720-4-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-1-0x00007FFE15DAD000-0x00007FFE15DAE000-memory.dmp

    Filesize

    4KB

  • memory/2720-10-0x00007FFDD3D30000-0x00007FFDD3D40000-memory.dmp

    Filesize

    64KB

  • memory/2720-7-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-6-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-8-0x00007FFDD5D90000-0x00007FFDD5DA0000-memory.dmp

    Filesize

    64KB

  • memory/2720-9-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-5-0x00007FFDD5D90000-0x00007FFDD5DA0000-memory.dmp

    Filesize

    64KB

  • memory/2720-2-0x00007FFDD5D90000-0x00007FFDD5DA0000-memory.dmp

    Filesize

    64KB

  • memory/2720-3-0x00007FFDD5D90000-0x00007FFDD5DA0000-memory.dmp

    Filesize

    64KB

  • memory/2720-11-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-12-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-13-0x00007FFDD3D30000-0x00007FFDD3D40000-memory.dmp

    Filesize

    64KB

  • memory/2720-78-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-145-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-146-0x00007FFE15DAD000-0x00007FFE15DAE000-memory.dmp

    Filesize

    4KB

  • memory/2720-147-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-151-0x00007FFE15D10000-0x00007FFE15F05000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-0-0x00007FFDD5D90000-0x00007FFDD5DA0000-memory.dmp

    Filesize

    64KB