Analysis

  • max time kernel
    133s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/10/2024, 09:45

General

  • Target

    decrypted.xlsx

  • Size

    1.2MB

  • MD5

    2b84eac40b5d1804b8912faf94b83ccf

  • SHA1

    a332e55ee3b5634245b571a115615dbd5bd6dc65

  • SHA256

    e2c41ecad1439afc87642000af8a353fe81aaed7a5e2f49d46cc10bdd076af57

  • SHA512

    c2d46f0df0e1ba754ae39cfc8d8ec76f0112b6bbb06feddc16c8ba5d3cda386b19e07c4fcb045626da9392824da651058c4fc615f92f99ab0903c3884c1999b5

  • SSDEEP

    24576:jBeNbAGiGiHz6FhGEP+uqzVfOU0hgPx2rBtM9JsEFunb+O:1IbLiGWE2uuVGUogPx2FtyfYnV

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          1KB

          MD5

          903177be369b9bd57bebe41d76df8d92

          SHA1

          cb81f1986bd74f1da8a6096f0947970ace7787b8

          SHA256

          fd7923da5f591b96073a5960c3efaf9c7b4250be67deabb04bdc7bd1356cc18b

          SHA512

          d2a51937dad857e3653bb493745837b49d7fd98ca5db0126131383331f763abc641bd0d73315eee361927a3adcbbfc69c74d0be3b1405c4f22b73fd43de6f9be

        • memory/1472-20-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-35-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-2-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

          Filesize

          64KB

        • memory/1472-4-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

          Filesize

          64KB

        • memory/1472-5-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

          Filesize

          64KB

        • memory/1472-11-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-10-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-12-0x00007FF807F30000-0x00007FF807F40000-memory.dmp

          Filesize

          64KB

        • memory/1472-9-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-8-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-13-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-22-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-3-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

          Filesize

          64KB

        • memory/1472-17-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-14-0x00007FF807F30000-0x00007FF807F40000-memory.dmp

          Filesize

          64KB

        • memory/1472-21-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-19-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-18-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-16-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-15-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-7-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-6-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-33-0x00007FF849FAD000-0x00007FF849FAE000-memory.dmp

          Filesize

          4KB

        • memory/1472-34-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-1-0x00007FF809F90000-0x00007FF809FA0000-memory.dmp

          Filesize

          64KB

        • memory/1472-39-0x00007FF849F10000-0x00007FF84A105000-memory.dmp

          Filesize

          2.0MB

        • memory/1472-0-0x00007FF849FAD000-0x00007FF849FAE000-memory.dmp

          Filesize

          4KB