Analysis
-
max time kernel
133s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
Quotation Sample_398893.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Quotation Sample_398893.xlsx
Resource
win10v2004-20241007-en
General
-
Target
Quotation Sample_398893.xlsx
-
Size
1.0MB
-
MD5
1fa0c01f5ce39c3040b272cc0178b526
-
SHA1
7dcc0072cda211e5af3e025335398691736f7c7d
-
SHA256
b33d9e331c5b5e6a463d3be8b0456156459983fa4889009e9ba23e355f8548e5
-
SHA512
2c686ad61500d70ebeeddc04b26bcb6301877960c2dd03fcc4f82dc8344607ee04b33cf06ab9e63e160393a407a5385991cac5ccbfe5d35b6535705bb075bc49
-
SSDEEP
24576:DsP8ORmk0aZyMRIithugFmoXo0Jf4rkL7cd1AQIRL:DW8ORlZdthugFD4rPLA9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Quotation Sample_398893.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53fceb15e6d9a29680f0d373bafe92f28
SHA100bee859445c0bb41b716d0f697418a7dc0c444c
SHA2562d71c2ef43b197afce85d9769c7631a77243e7cd878e3b37e76344129b87dcab
SHA5128793ff61811c9e9f64bc17f16c7534580511d442ad849579bd16010df47721b86a7073a93e04e0c40a3a0909e96879d461fc31bfcf67ccde1d2833b861202f68