Analysis
-
max time kernel
100s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
Fatura 001.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Fatura 001.xlsx
Resource
win10v2004-20240802-en
General
-
Target
Fatura 001.xlsx
-
Size
1.9MB
-
MD5
9273a696f6ef57cdda7670f5b8742a1a
-
SHA1
68b3f8d1448d31d42f0efdb59313ee031bba0c7c
-
SHA256
df4c4ff517e33b8a2cec86619652fa6cdb4ed7acd120a7e8866b673cb554b974
-
SHA512
407ed0402d1940b5d7dfceb0bf45bf05814f54b091b1cfbc918bdf715b91a97e949bbad176bef553820a40885e9382633d5853ce2e31f130d74b3d6f470b2110
-
SSDEEP
49152:c2Hqv0ubGHrUFG9Etdc+BEJiAOtSigHUZRsT:H3+GHrUA9Enc+CpUZRsT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3396 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE 3396 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Fatura 001.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3396
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ff1db892790f981e5e3e1be0a125a722
SHA1270014a55c6d49b7ff14187aaaadc95938216b19
SHA2566e5b0e17fb7cbe8af77794caf093a3471aff6e2ea7e12005088c8074bec74fce
SHA5122fd5ca8d6079e7df35f8944e2c856c31d33b82e35dd636888e9c5aa929074872371f834a34613df8c0ca441e21917b7f5beb35d83f1f0fd2f93c67ce2cd4f198