Analysis

  • max time kernel
    100s
  • max time network
    123s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2024 07:07

General

  • Target

    0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be.xlsx

  • Size

    3.9MB

  • MD5

    5ffc2a72ff05e1f486e4aa0142b89a23

  • SHA1

    1d7428dd31e095b0aa43a61c962e7d42587c3f0c

  • SHA256

    0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be

  • SHA512

    3b9753133f33901cc5fe4cc9e13ddb860b6a4cbae572ba4aad0149589c4b162caa9352dc57831d9c532367e5f978e22de34612566990fd0e83aaba4797cec7d4

  • SSDEEP

    98304:fxCNiZcsxN2HwHTiOsR1PWdVUnugvD50Dm:ZC8ZcsiOPdEugvDV

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    5c448f2f46834826f67922fd4b3bc3c2

    SHA1

    69109ffa3bce6658eb1f7cf4d747724992fefee8

    SHA256

    13123c15da273a82ca258091adba324602a6f851af419397de4635f78ef66210

    SHA512

    58868e696d0fadf219a23a16e32eb1fe5743d64936d847495213b27e3243853364025e4dac71fa0b5da0a45bc07e93025d56d6d898066f575f7bf160046d21c1

  • memory/2228-21-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-4-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-18-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-2-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-9-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-10-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-12-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-13-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-14-0x00007FF7EFDA0000-0x00007FF7EFDB0000-memory.dmp

    Filesize

    64KB

  • memory/2228-11-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-8-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-16-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-19-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-1-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-63-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-3-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-17-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-15-0x00007FF7EFDA0000-0x00007FF7EFDB0000-memory.dmp

    Filesize

    64KB

  • memory/2228-7-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-6-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-5-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-32-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-31-0x00007FF831E6D000-0x00007FF831E6E000-memory.dmp

    Filesize

    4KB

  • memory/2228-33-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB

  • memory/2228-0-0x00007FF831E6D000-0x00007FF831E6E000-memory.dmp

    Filesize

    4KB

  • memory/2228-60-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-59-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-61-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-62-0x00007FF7F1E50000-0x00007FF7F1E60000-memory.dmp

    Filesize

    64KB

  • memory/2228-20-0x00007FF831DD0000-0x00007FF831FC5000-memory.dmp

    Filesize

    2.0MB