Analysis
-
max time kernel
47s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2024 21:33
Behavioral task
behavioral1
Sample
26b70a084a485a7e661b4e72a525c3f45bb3613049a6390c4c3a72d3753ab142.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
26b70a084a485a7e661b4e72a525c3f45bb3613049a6390c4c3a72d3753ab142.xls
Resource
win10v2004-20241007-en
General
-
Target
26b70a084a485a7e661b4e72a525c3f45bb3613049a6390c4c3a72d3753ab142.xls
-
Size
165KB
-
MD5
1478ae4e14a0dd6c1cffcd05f457f0c6
-
SHA1
73055faa4929f2c182424a06c251d1571b9c9a83
-
SHA256
26b70a084a485a7e661b4e72a525c3f45bb3613049a6390c4c3a72d3753ab142
-
SHA512
59c79cbb118e46372fb8c36ab2c5effc0470cc6b0b10dc516f944a76737304e0df63c8f5c0a5d25fa7bf6e648e0bd244ddd99d577ca4a7bc92eef3680b5c290c
-
SSDEEP
3072:AAxEtjPOtioVjDGUU1qfDlaGGx+cL/IEHgny9MnLm9MLL49MoL89MFLV9MGL+/59:ZxEtjPOtioVjDGUU1qfDlavx+W/IEH41
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1128 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE 1128 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1128 wrote to memory of 5016 1128 EXCEL.EXE 88 PID 1128 wrote to memory of 5016 1128 EXCEL.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\26b70a084a485a7e661b4e72a525c3f45bb3613049a6390c4c3a72d3753ab142.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:5016
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2776
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2B
MD5f3b25701fe362ec84616a93a45ce9998
SHA1d62636d8caec13f04e28442a0a6fa1afeb024bbb
SHA256b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209
SHA51298c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84