Resubmissions

23/10/2024, 13:04

241023-qbdl4atckr 10

20/09/2024, 01:31

240920-bxp5pasejn 10

Analysis

  • max time kernel
    87s
  • max time network
    91s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/10/2024, 13:04

General

  • Target

    Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll

  • Size

    660KB

  • MD5

    ea64d820b7ee387d0e811bca0104d9e4

  • SHA1

    6f48f58d80ae41f6b979402696c70db74afc3135

  • SHA256

    af74d416b65217d0b15163e7b3fd5d0702d65f88b260c269c128739e7e7a4c4d

  • SHA512

    b096717383ec11253d918efcdbe729752869b5e6502875affb1ceb98b8c7097c69103cb57993b42068c38c58781f5476453e5753b9f6e05403d41bc6b3bdf780

  • SSDEEP

    6144:yxOJXk57IMp7oyR4y6Qf3lbp83A6zbKsS5ukTP2YmqtbSGUmuqZGw+gSe81H9zq2:yx2s7IMrR4yVld8bzbBSreDqZGDxlq

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\A0F7B4B2-3C4D-4C6A-8182-95F3D7404A1E

    Filesize

    3B

    MD5

    8a80554c91d9fca8acb82f023de02f11

    SHA1

    5f36b2ea290645ee34d943220a14b54ee5ea5be5

    SHA256

    ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356

    SHA512

    ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    53ebf2f4a1ed923ad8e7ba5b48533c59

    SHA1

    a81876664c24234caeafaf209a72cdb109baafc2

    SHA256

    5e5ad56f8e364520b7ef4e1cbef9627ef28c960ca9a73d760b5b585c2602abba

    SHA512

    d1cca2c707240938187612c00bf53ab2a46d26c80f04ad372af5a9a0964959b6f9af5f41182c3ad07a4f6b6e367ba1d2a67ae8c0ee389dfb91ad3865a948adb7

  • memory/3636-10-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp

    Filesize

    64KB

  • memory/3636-13-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-5-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3636-4-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3636-8-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-6-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-9-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-7-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-1-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp

    Filesize

    4KB

  • memory/3636-0-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3636-12-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-11-0x00007FFC5B910000-0x00007FFC5B920000-memory.dmp

    Filesize

    64KB

  • memory/3636-14-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-16-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-17-0x00007FFC9E28D000-0x00007FFC9E28E000-memory.dmp

    Filesize

    4KB

  • memory/3636-18-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-21-0x00007FFC9E1F0000-0x00007FFC9E3E5000-memory.dmp

    Filesize

    2.0MB

  • memory/3636-2-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB

  • memory/3636-3-0x00007FFC5E270000-0x00007FFC5E280000-memory.dmp

    Filesize

    64KB