Analysis
-
max time kernel
100s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be.xlsx
Resource
win10v2004-20240802-en
General
-
Target
0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be.xlsx
-
Size
3.9MB
-
MD5
5ffc2a72ff05e1f486e4aa0142b89a23
-
SHA1
1d7428dd31e095b0aa43a61c962e7d42587c3f0c
-
SHA256
0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be
-
SHA512
3b9753133f33901cc5fe4cc9e13ddb860b6a4cbae572ba4aad0149589c4b162caa9352dc57831d9c532367e5f978e22de34612566990fd0e83aaba4797cec7d4
-
SSDEEP
98304:fxCNiZcsxN2HwHTiOsR1PWdVUnugvD50Dm:ZC8ZcsiOPdEugvDV
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2228 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE 2228 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0f626eca4a80a70619bded3da7db0cbac8de8effb65482cdf05962ff789155be.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD55c448f2f46834826f67922fd4b3bc3c2
SHA169109ffa3bce6658eb1f7cf4d747724992fefee8
SHA25613123c15da273a82ca258091adba324602a6f851af419397de4635f78ef66210
SHA51258868e696d0fadf219a23a16e32eb1fe5743d64936d847495213b27e3243853364025e4dac71fa0b5da0a45bc07e93025d56d6d898066f575f7bf160046d21c1