Analysis
-
max time kernel
46s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 21:32
Behavioral task
behavioral1
Sample
267701a05ddce787191032f6231c0629ac70f0baf0afb159a569dbeb2bf7ee43.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
267701a05ddce787191032f6231c0629ac70f0baf0afb159a569dbeb2bf7ee43.xls
Resource
win10v2004-20240802-en
General
-
Target
267701a05ddce787191032f6231c0629ac70f0baf0afb159a569dbeb2bf7ee43.xls
-
Size
76KB
-
MD5
7997f5d1028d7f02a4e420938bb32c88
-
SHA1
49a9550f93fde8fc7fee814742123e3c5aaf9124
-
SHA256
267701a05ddce787191032f6231c0629ac70f0baf0afb159a569dbeb2bf7ee43
-
SHA512
a9722c239218f064b2945d0e2274bac01edbc5d06104fbd4eee97554994d90db93c776d30ae4b48f79a0020d83b52a14de514a59b9b86e299b3069f61d917af9
-
SSDEEP
1536:2zxEtjPOtioVjDGUU1qfDlaGGx+cWgLI0dAk6s+eqlqn85L:2zxEtjPOtioVjDGUU1qfDlaGGx+cWgLB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2700 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2700 EXCEL.EXE 2700 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE 2700 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\267701a05ddce787191032f6231c0629ac70f0baf0afb159a569dbeb2bf7ee43.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2700
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD5c74399808fe988e86f289f7b6d558fd6
SHA1b9f96126198e3e5fdd6347af6703945d3e4c6f92
SHA25604c74b3dd602b129f59616d34c2586adfac9e177733d43ea28ebf3fdb0c4e97c
SHA51240d0a19c91356316ad20dd94af3e9b49d294cb6defdc967642c20df8cb0966af6c5ba9c8f030697c28dcbe01bd92e21185d24d33502fccd50ed85922ca60020c