Analysis

  • max time kernel
    101s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-09-2024 18:59

General

  • Target

    9.24.24/Lapsed_as of 9.23.24.xls

  • Size

    28KB

  • MD5

    4e8a987fecfa0c8fc2915b2816566ebd

  • SHA1

    b176da02be420614c6d212f6742da8b4bddb1629

  • SHA256

    0e26453d1917c0442a6cdb1f246c3c6c734a3635bbcea3c3298479e9640c5e84

  • SHA512

    926ddd9ecc4714d1eacbdd66de9f2bff41855861c2de75b9108322a0c105ddd865f147f1a0a3ed33c3773bb8246020e9ce126c691f161bcfd96f5329a1ebf486

  • SSDEEP

    768:aPSFsv66g3KnF439NKC54kkGfn+cL2XdEOMwGjrhS:oSFsv66g3KnF439NKC54kkGfn+cL2Xdp

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9.24.24\Lapsed_as of 9.23.24.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    1d11f742f32da734b40a66fba9e43def

    SHA1

    739c035859ab9bdf43dc8bcc1d504e77585bfbbd

    SHA256

    d9c1a32fa8fedc2ab1a3990bfc482b3c2b05b9a509d6b6d736e3f213b8cf94eb

    SHA512

    e04dd1a7d4983e2f005b4351f4716e496f83e199d5b1fa1a2bfceafba5347817ef08dc981fa4df37f1b2067fbe6c5c32423cc468d1ceb3698dace7fa0e02889a

  • memory/4740-14-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-55-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-9-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-4-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-7-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-8-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-12-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-11-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-13-0x00007FF806B30000-0x00007FF806B40000-memory.dmp

    Filesize

    64KB

  • memory/4740-10-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-6-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-5-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-2-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-3-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-1-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-16-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-15-0x00007FF806B30000-0x00007FF806B40000-memory.dmp

    Filesize

    64KB

  • memory/4740-27-0x00007FF848FAD000-0x00007FF848FAE000-memory.dmp

    Filesize

    4KB

  • memory/4740-28-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-29-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-30-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-17-0x00007FF848F10000-0x00007FF849105000-memory.dmp

    Filesize

    2.0MB

  • memory/4740-51-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-53-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-54-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-52-0x00007FF808F90000-0x00007FF808FA0000-memory.dmp

    Filesize

    64KB

  • memory/4740-0-0x00007FF848FAD000-0x00007FF848FAE000-memory.dmp

    Filesize

    4KB