Analysis

  • max time kernel
    60s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-10-2024 21:17

General

  • Target

    291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb.xlsm

  • Size

    92KB

  • MD5

    3c7e89cd5d37cd4ad46c9afafbb396b5

  • SHA1

    a598052938f1eaa191882285e418b0b4eeed8042

  • SHA256

    291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb

  • SHA512

    3b748957b4bc25bf8dc7cd64a92ff3238fe4ed185516e6686bf7221f4212d82c856cca89925264a6e9389243499b80e91d6e0447ab50edf17444335dd6740a0a

  • SSDEEP

    1536:CguZCa6S5khUITWHTp4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIHFp:CgugapkhlTWHTpaPjpM+d/Ms8ULavLc2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    969954db0ab00bd579929459fe4758c4

    SHA1

    95c7e049cebfaec4e54a11da29762b758e25b859

    SHA256

    26a728005b23ea3fc31b127fcbb8d1b47529f51a758c2b0b2eb99565ad1a5f80

    SHA512

    a4dd67cfcf2e9e123e516adfb7cc306fa7867c9c7bf4fdad8f76eb7a2ce9896f17e95a32aad1e55f388264c842621acc5ee10c29e0ad08aa2a4a89182b33b887

  • memory/4116-14-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-1-0x00007FFDFF6ED000-0x00007FFDFF6EE000-memory.dmp

    Filesize

    4KB

  • memory/4116-11-0x00007FFDBD370000-0x00007FFDBD380000-memory.dmp

    Filesize

    64KB

  • memory/4116-6-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-5-0x00007FFDBF6D0000-0x00007FFDBF6E0000-memory.dmp

    Filesize

    64KB

  • memory/4116-4-0x00007FFDBF6D0000-0x00007FFDBF6E0000-memory.dmp

    Filesize

    64KB

  • memory/4116-10-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-9-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-8-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-13-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-2-0x00007FFDBF6D0000-0x00007FFDBF6E0000-memory.dmp

    Filesize

    64KB

  • memory/4116-3-0x00007FFDBF6D0000-0x00007FFDBF6E0000-memory.dmp

    Filesize

    64KB

  • memory/4116-7-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-12-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-16-0x00007FFDBD370000-0x00007FFDBD380000-memory.dmp

    Filesize

    64KB

  • memory/4116-15-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-62-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-145-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-146-0x00007FFDFF6ED000-0x00007FFDFF6EE000-memory.dmp

    Filesize

    4KB

  • memory/4116-147-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-148-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-149-0x00007FFDFF650000-0x00007FFDFF845000-memory.dmp

    Filesize

    2.0MB

  • memory/4116-0-0x00007FFDBF6D0000-0x00007FFDBF6E0000-memory.dmp

    Filesize

    64KB