Analysis

  • max time kernel
    102s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-09-2024 01:40

General

  • Target

    b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3.xlam

  • Size

    589KB

  • MD5

    9fe19f03b1390e3e5cb002ecccb1b640

  • SHA1

    1cb49826edf0ea2ae0812849bceaeddea85e341f

  • SHA256

    b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3

  • SHA512

    7f5b11ae09a251bab33687f2801ba7fd296cdf643755e52bf5df04d9c1487cf5be671341709b92fb811f361874a9c281a17a6ddac604ee5307f0c1d2c11a6c03

  • SSDEEP

    12288:N90ZXxjZrLKswQMZXyil/4ofwXWMLFFfeaXxX4K6vj:QZXrKOM8ilnOWUFfFB4K6vj

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b8e762cb476f275f788c3b8db49cd3ef3e6fbb3c8d62596a8ccc56f1bc3c54a3.xlam"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F434EHL90EEQ556T1IUC.temp

    Filesize

    1KB

    MD5

    afc57f1076e6daaf967f9a88035204b5

    SHA1

    24c14de1b0bf40ac91a02d09f585f6786f409d73

    SHA256

    4ebc08a360e19d0051177b07ef05acba1f94b2b2ad4c3cbbe8e1cb522c74974c

    SHA512

    1de92a10ae37d204d016ced5d854e0e8f4a49b031c83340767dadc0731a983b43bcdc050d05aaf3e3f6f8665971bb24137501b41c08dfd4a00d84b2e40146d78

  • memory/3316-14-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-57-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-0-0x00007FFFBD14D000-0x00007FFFBD14E000-memory.dmp

    Filesize

    4KB

  • memory/3316-4-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-6-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-5-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-11-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-12-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-10-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-13-0x00007FFF7AF10000-0x00007FFF7AF20000-memory.dmp

    Filesize

    64KB

  • memory/3316-9-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-8-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-58-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-1-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-16-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-17-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-19-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-18-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-15-0x00007FFF7AF10000-0x00007FFF7AF20000-memory.dmp

    Filesize

    64KB

  • memory/3316-29-0x00007FFFBD14D000-0x00007FFFBD14E000-memory.dmp

    Filesize

    4KB

  • memory/3316-30-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-31-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3316-2-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-54-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-55-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-3-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-56-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3316-7-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB