Analysis
-
max time kernel
46s -
max time network
41s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 22:01
Behavioral task
behavioral1
Sample
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls
Resource
win10v2004-20240802-en
General
-
Target
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls
-
Size
184KB
-
MD5
9431258606d6ffc1222205f20890f263
-
SHA1
e09bf0335be302fb5761d383f940fb512339f7b3
-
SHA256
0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce
-
SHA512
c307d747d0fae105abe79dcf30b5495510c181abc6584cd655a6054c58aea3e14b46499cff8ca547e061241a3fa2203daa4075f81607f5ba5bc7a25339c18964
-
SSDEEP
3072:6RCd3AxosdMvT63mxMnkxHWmsuM1zpRh+BUGf2XIEAYhIXBI9g3+4Zbjc0wUdC+q:6RCd3AxosdMvT63mxMnkxHWmsuMZpRoN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3168 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE 3168 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0d150863d1829f1a75acfbb05a4ba101a7d647dd4f328198a1f380781838d3ce.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a40d44d9e682c79c1d1c4f65ac77037b
SHA135e3e20481a3304c7106e38c29a11ef157637052
SHA256e9bfb6919da3e3eca0cdc6657797f968687490ad6784843c22a198d8e587d935
SHA5123e2aa30dd612f09c59c89cb95639b8b87211d3746e0da715ed8b4ca3396245eb6effffa30e84f37c661ec900804b11d9b95d3d1e797fa198e6485e96306f46a9