Resubmissions

23/10/2024, 13:04

241023-qbdl4atckr 10

20/09/2024, 01:31

240920-bxp5pasejn 10

Analysis

  • max time kernel
    101s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 01:31

General

  • Target

    Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll

  • Size

    660KB

  • MD5

    ea64d820b7ee387d0e811bca0104d9e4

  • SHA1

    6f48f58d80ae41f6b979402696c70db74afc3135

  • SHA256

    af74d416b65217d0b15163e7b3fd5d0702d65f88b260c269c128739e7e7a4c4d

  • SHA512

    b096717383ec11253d918efcdbe729752869b5e6502875affb1ceb98b8c7097c69103cb57993b42068c38c58781f5476453e5753b9f6e05403d41bc6b3bdf780

  • SSDEEP

    6144:yxOJXk57IMp7oyR4y6Qf3lbp83A6zbKsS5ukTP2YmqtbSGUmuqZGw+gSe81H9zq2:yx2s7IMrR4yVld8bzbBSreDqZGDxlq

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3756-0-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-3-0x00007FFCCF3AD000-0x00007FFCCF3AE000-memory.dmp

    Filesize

    4KB

  • memory/3756-1-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-2-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-6-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-7-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-8-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-5-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-4-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-11-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-10-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-9-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-13-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-12-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-14-0x00007FFC8CC10000-0x00007FFC8CC20000-memory.dmp

    Filesize

    64KB

  • memory/3756-16-0x00007FFC8CC10000-0x00007FFC8CC20000-memory.dmp

    Filesize

    64KB

  • memory/3756-15-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-17-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-19-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-18-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-29-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB

  • memory/3756-50-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-51-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-53-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-52-0x00007FFC8F390000-0x00007FFC8F3A0000-memory.dmp

    Filesize

    64KB

  • memory/3756-54-0x00007FFCCF310000-0x00007FFCCF505000-memory.dmp

    Filesize

    2.0MB