Analysis

  • max time kernel
    56s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2024, 21:06

General

  • Target

    e000723f4d3979240496b7886b554c8423a2a85b5b5b4c790ddfa972f7e4a610.xlsm

  • Size

    25KB

  • MD5

    af75ab8e76f11765f49cffb282623c8d

  • SHA1

    3043213e6977e5be4090024c0a1239b761b3b999

  • SHA256

    e000723f4d3979240496b7886b554c8423a2a85b5b5b4c790ddfa972f7e4a610

  • SHA512

    c44729a443f2e5e9780fa61ce71c4f4c32c7070e2a87b795c4e276fcc3d90c9f5bc7c839f7177ed159cf7fcb26517523a8455ab235e67ad83b5629bd0dc94ebc

  • SSDEEP

    384:80blUlM9zF4QQM9+0X82yO6h/uljDA/07oXYg2DnS4hR884M+nbmG/lI+bN:8Kxx4m9+0YO6VAA/07oWDtF6p/lvbN

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e000723f4d3979240496b7886b554c8423a2a85b5b5b4c790ddfa972f7e4a610.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3548-0-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3548-1-0x00007FFFBD14D000-0x00007FFFBD14E000-memory.dmp

    Filesize

    4KB

  • memory/3548-2-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3548-3-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3548-4-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3548-6-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-8-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-10-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-9-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-7-0x00007FFF7D130000-0x00007FFF7D140000-memory.dmp

    Filesize

    64KB

  • memory/3548-11-0x00007FFF7AF10000-0x00007FFF7AF20000-memory.dmp

    Filesize

    64KB

  • memory/3548-5-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-12-0x00007FFF7AF10000-0x00007FFF7AF20000-memory.dmp

    Filesize

    64KB

  • memory/3548-13-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-15-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-19-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-18-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-17-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-16-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-14-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-33-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-42-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-43-0x00007FFFBD14D000-0x00007FFFBD14E000-memory.dmp

    Filesize

    4KB

  • memory/3548-44-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-45-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB

  • memory/3548-49-0x00007FFFBD0B0000-0x00007FFFBD2A5000-memory.dmp

    Filesize

    2.0MB