Analysis

  • max time kernel
    46s
  • max time network
    41s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-10-2024 22:01

General

  • Target

    0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls

  • Size

    184KB

  • MD5

    9431258606d6ffc1222205f20890f263

  • SHA1

    e09bf0335be302fb5761d383f940fb512339f7b3

  • SHA256

    0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce

  • SHA512

    c307d747d0fae105abe79dcf30b5495510c181abc6584cd655a6054c58aea3e14b46499cff8ca547e061241a3fa2203daa4075f81607f5ba5bc7a25339c18964

  • SSDEEP

    3072:6RCd3AxosdMvT63mxMnkxHWmsuM1zpRh+BUGf2XIEAYhIXBI9g3+4Zbjc0wUdC+q:6RCd3AxosdMvT63mxMnkxHWmsuMZpRoN

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3168

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    a40d44d9e682c79c1d1c4f65ac77037b

    SHA1

    35e3e20481a3304c7106e38c29a11ef157637052

    SHA256

    e9bfb6919da3e3eca0cdc6657797f968687490ad6784843c22a198d8e587d935

    SHA512

    3e2aa30dd612f09c59c89cb95639b8b87211d3746e0da715ed8b4ca3396245eb6effffa30e84f37c661ec900804b11d9b95d3d1e797fa198e6485e96306f46a9

  • memory/3168-8-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-3-0x00007FF8A52CD000-0x00007FF8A52CE000-memory.dmp

    Filesize

    4KB

  • memory/3168-14-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-5-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-7-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-10-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-12-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-13-0x00007FF863010000-0x00007FF863020000-memory.dmp

    Filesize

    64KB

  • memory/3168-11-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-6-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

    Filesize

    64KB

  • memory/3168-1-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

    Filesize

    64KB

  • memory/3168-0-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

    Filesize

    64KB

  • memory/3168-9-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-15-0x00007FF863010000-0x00007FF863020000-memory.dmp

    Filesize

    64KB

  • memory/3168-4-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

    Filesize

    64KB

  • memory/3168-36-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-38-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-37-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-35-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-39-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-40-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-41-0x00007FF8A5230000-0x00007FF8A5425000-memory.dmp

    Filesize

    2.0MB

  • memory/3168-2-0x00007FF8652B0000-0x00007FF8652C0000-memory.dmp

    Filesize

    64KB