Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240910-en -
resource tags
arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2024 21:14
Static task
static1
Behavioral task
behavioral1
Sample
df4c4ff517e33b8a2cec86619652fa6cdb4ed7acd120a7e8866b673cb554b974.xlsx
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
df4c4ff517e33b8a2cec86619652fa6cdb4ed7acd120a7e8866b673cb554b974.xlsx
Resource
win10v2004-20240910-en
General
-
Target
df4c4ff517e33b8a2cec86619652fa6cdb4ed7acd120a7e8866b673cb554b974.xlsx
-
Size
1.9MB
-
MD5
9273a696f6ef57cdda7670f5b8742a1a
-
SHA1
68b3f8d1448d31d42f0efdb59313ee031bba0c7c
-
SHA256
df4c4ff517e33b8a2cec86619652fa6cdb4ed7acd120a7e8866b673cb554b974
-
SHA512
407ed0402d1940b5d7dfceb0bf45bf05814f54b091b1cfbc918bdf715b91a97e949bbad176bef553820a40885e9382633d5853ce2e31f130d74b3d6f470b2110
-
SSDEEP
49152:c2Hqv0ubGHrUFG9Etdc+BEJiAOtSigHUZRsT:H3+GHrUA9Enc+CpUZRsT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3284 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\df4c4ff517e33b8a2cec86619652fa6cdb4ed7acd120a7e8866b673cb554b974.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3284
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5f45edac2a4a518855e09a833f95bb3eb
SHA12dab775f37a7a4254f776e08ecef5fcbe11395a7
SHA256a132f0e5837b905d24d6ade09aa232213fcbcf98652d710cdc731e9a8ee53ee4
SHA5120b6e4baa55d6104bd52d67529e76c6077404369b6fea9f3f1f9bbf4e238f115695a2acc4b4c7b00453631e0697a78b78a66278774752f00aa4c9ee2d05dba0d5