Analysis
-
max time kernel
100s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 06:44
Static task
static1
Behavioral task
behavioral1
Sample
e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe
Resource
win10v2004-20240802-en
General
-
Target
e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe
-
Size
1.5MB
-
MD5
49f50d28a6b74a5a0fecf64253ddfb70
-
SHA1
65bf79e843bb5706d5dc24f51dc3fc2ae37e26a9
-
SHA256
e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9df
-
SHA512
47c8e56e1e6750d250efab901ab22bdf32e600593c4f340de48e73aefd9ca2c2de646830262cb6924574bb38c74341974365f612fe01b73dd7453b8b9f98297b
-
SSDEEP
1536:5ROJXGKhn2JoCvrj7RGEcjU30copKsu9VE7WZMl+LN4D/f4TEaY90rHc3YmFdaqg:YjVsTulb1Zkgcxq8PWxWi1fLr
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2328 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30 PID 1920 wrote to memory of 2328 1920 e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe"C:\Users\Admin\AppData\Local\Temp\e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde2⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2328
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\e623aac494af0e54ab670e708354c17f0b7fc4e9fe737c8fd19845b95a4ba9dfN.xlsx
Filesize1.5MB
MD5ccb4948d1744b128f96307722b22de87
SHA17892ac6c28b3698dd98d26d6312f180b3bb1c233
SHA256c0b078682b66f209767b1e1bdbb64e924498e93399ff3ee4892896abe05546f4
SHA5127e01ff700fe7aba0f688b794b6ae769e2de5378690ed907d04074d31e72e7a4dacacca3093e56c945c01f60223084fc9e0c80feaab8a79ca62c0db0fdc2b3a1d