Analysis

  • max time kernel
    47s
  • max time network
    48s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2024 21:15

General

  • Target

    cbd5c050bdd0cfe7292e46b879f9468c9b80bd1a09644418a6039ba08a2e2d7d.xlsm

  • Size

    92KB

  • MD5

    b62d1ff49636e8428150dd9702a5abc9

  • SHA1

    4a1eb548cc77f894b375f724110b85016bf5117f

  • SHA256

    cbd5c050bdd0cfe7292e46b879f9468c9b80bd1a09644418a6039ba08a2e2d7d

  • SHA512

    06b3c7d73fd8c041b0dc633157277839ee97d4e92aea893c121fe18a1584d0165af9309080f898cc3b066b5944393fbf7b38a3b9fcc59d25bbae29fcb28a6d25

  • SSDEEP

    1536:CguZCa6S5khUI7+BTw0du4znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYIIkFD:Cgugapkhl7+S0duaPjpqxvD/Ms8ULav2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cbd5c050bdd0cfe7292e46b879f9468c9b80bd1a09644418a6039ba08a2e2d7d.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:312

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    2KB

    MD5

    2690657adad8f93abcfce2b33ece2fff

    SHA1

    8c4f24b466756092bc5ca730005524dfa6afcc98

    SHA256

    016a6ef474e1e5d175cc936fbc0900ddfa8f09857094e12b8e410c927857a448

    SHA512

    ae26943f26000e7d1b7426f9d3945140cf70084f54688e8680a48a71d290534b4832d0c131285d2fa4ab9b2a87b3ade8cd9521a75af547303963d6c20798ba80

  • memory/312-10-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-4-0x00007FFA68390000-0x00007FFA683A0000-memory.dmp

    Filesize

    64KB

  • memory/312-7-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-5-0x00007FFA68390000-0x00007FFA683A0000-memory.dmp

    Filesize

    64KB

  • memory/312-2-0x00007FFA68390000-0x00007FFA683A0000-memory.dmp

    Filesize

    64KB

  • memory/312-9-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-11-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-12-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-6-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-0-0x00007FFA68390000-0x00007FFA683A0000-memory.dmp

    Filesize

    64KB

  • memory/312-1-0x00007FFAA83AD000-0x00007FFAA83AE000-memory.dmp

    Filesize

    4KB

  • memory/312-3-0x00007FFA68390000-0x00007FFA683A0000-memory.dmp

    Filesize

    64KB

  • memory/312-13-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-14-0x00007FFA65D50000-0x00007FFA65D60000-memory.dmp

    Filesize

    64KB

  • memory/312-15-0x00007FFA65D50000-0x00007FFA65D60000-memory.dmp

    Filesize

    64KB

  • memory/312-63-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-144-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-145-0x00007FFAA83AD000-0x00007FFAA83AE000-memory.dmp

    Filesize

    4KB

  • memory/312-146-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-147-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-148-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB

  • memory/312-8-0x00007FFAA8310000-0x00007FFAA8505000-memory.dmp

    Filesize

    2.0MB