Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
9511b4e366295c44867d8eee1689b3f4c56e07e11e8252f9ec56acee0b16d2c2.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9511b4e366295c44867d8eee1689b3f4c56e07e11e8252f9ec56acee0b16d2c2.xls
Resource
win10v2004-20240802-en
General
-
Target
9511b4e366295c44867d8eee1689b3f4c56e07e11e8252f9ec56acee0b16d2c2.xls
-
Size
632KB
-
MD5
c1d8b9d7970edfa3503368ba49593d09
-
SHA1
4a13990f08f0b1e93161bd951a58fe0ed9f2e2ca
-
SHA256
9511b4e366295c44867d8eee1689b3f4c56e07e11e8252f9ec56acee0b16d2c2
-
SHA512
9c55b8277234321c80c5fad77051cbf484c513201a3aa7f95b841014a60d941dc8f08b7c2187246d1fc1fba87fc77b948b192dd0c214e5ba9c2574f2e5352a04
-
SSDEEP
12288:8WOqcv4hcMe1o6rScV41lSjGLTL6FqST4aTFbLk9WCA:IqcwhchvSA4eKfLUvpk9Wf
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2804 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9511b4e366295c44867d8eee1689b3f4c56e07e11e8252f9ec56acee0b16d2c2.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53e1f1b8873a08d374e7dc83d438f987d
SHA1996b6e71eb47b3396ad6a96f70e44ea3f9a0d69e
SHA256471ec8c8c4b3c54a54c029b49073be617a5608eaf9ef1001d7c7e0b51acddf8c
SHA51249f69897907f82380ca45333af3623a1e606d21b03d90960caf540fc4ab5eba32d381cc418bec9803ee0aac61dd12644fe5a6e3c428000d7f631c8e1134a07a2