Analysis
-
max time kernel
87s -
max time network
91s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2024, 13:04
Static task
static1
Behavioral task
behavioral1
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix (2).xll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix (2).xll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Quarterly Cambodia Poll Appendix.pdf.lnk
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Quarterly Cambodia Poll Appendix.pdf.lnk
Resource
win10v2004-20241007-en
General
-
Target
Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll
-
Size
660KB
-
MD5
ea64d820b7ee387d0e811bca0104d9e4
-
SHA1
6f48f58d80ae41f6b979402696c70db74afc3135
-
SHA256
af74d416b65217d0b15163e7b3fd5d0702d65f88b260c269c128739e7e7a4c4d
-
SHA512
b096717383ec11253d918efcdbe729752869b5e6502875affb1ceb98b8c7097c69103cb57993b42068c38c58781f5476453e5753b9f6e05403d41bc6b3bdf780
-
SSDEEP
6144:yxOJXk57IMp7oyR4y6Qf3lbp83A6zbKsS5ukTP2YmqtbSGUmuqZGw+gSe81H9zq2:yx2s7IMrR4yVld8bzbBSreDqZGDxlq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3636 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\A0F7B4B2-3C4D-4C6A-8182-95F3D7404A1E
Filesize3B
MD58a80554c91d9fca8acb82f023de02f11
SHA15f36b2ea290645ee34d943220a14b54ee5ea5be5
SHA256ca3d163bab055381827226140568f3bef7eaac187cebd76878e0b63e9e442356
SHA512ca4b6defb8adcc010050bc8b1bb8f8092c4928b8a0fba32146abcfb256e4d91672f88ca2cdf6210e754e5b8ac5e23fb023806ccd749ac8b701f79a691f03c87a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD553ebf2f4a1ed923ad8e7ba5b48533c59
SHA1a81876664c24234caeafaf209a72cdb109baafc2
SHA2565e5ad56f8e364520b7ef4e1cbef9627ef28c960ca9a73d760b5b585c2602abba
SHA512d1cca2c707240938187612c00bf53ab2a46d26c80f04ad372af5a9a0964959b6f9af5f41182c3ad07a4f6b6e367ba1d2a67ae8c0ee389dfb91ad3865a948adb7