Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 09:46

General

  • Target

    malware.xlsx

  • Size

    2.2MB

  • MD5

    af4a015e14731aca9d5d89d18b6145a5

  • SHA1

    d43b9773c95cf3c7b0db3bf7d7571ea57db88898

  • SHA256

    d54bdc32e63a1159d8775046e4ac77bd96a6745c29049effea5303a37e2d865a

  • SHA512

    9629b2bffe3761bb7a9c5a31dc229f46f42a111825eb1c17a880228ae76a9ebd708e9c274661211dc82c436cf0de8ff0b6f1da45960e9f21c29a8e70ce24c774

  • SSDEEP

    49152:Jp1keRzwrg87vtJer92x2zUkW2AhynUOAgLhouLDDeccF51Q:Jsm387XdkSPkNfJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\malware.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2848

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    bbcd6171368f1766a1a399acec076151

    SHA1

    3a28b6b7cdfb35a97b63efbbc157cb45c641bf89

    SHA256

    6c750cd9e32c550015511e0590ba61094f816600ddf9246c5d2bc88d178840f3

    SHA512

    beea233911a27777f45a5cc0958c65433d1a8467f8ee7df4e5c8b894486990bef651a6a2ab68c2aac1d93686c1a185573c77e0a6c9a7ac9b2c3b54165affc859

  • memory/2848-12-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-5-0x00007FFE0EE90000-0x00007FFE0EEA0000-memory.dmp

    Filesize

    64KB

  • memory/2848-11-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-15-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-13-0x00007FFE0C910000-0x00007FFE0C920000-memory.dmp

    Filesize

    64KB

  • memory/2848-8-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-7-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-10-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-9-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-0-0x00007FFE0EE90000-0x00007FFE0EEA0000-memory.dmp

    Filesize

    64KB

  • memory/2848-4-0x00007FFE0EE90000-0x00007FFE0EEA0000-memory.dmp

    Filesize

    64KB

  • memory/2848-3-0x00007FFE0EE90000-0x00007FFE0EEA0000-memory.dmp

    Filesize

    64KB

  • memory/2848-2-0x00007FFE0EE90000-0x00007FFE0EEA0000-memory.dmp

    Filesize

    64KB

  • memory/2848-16-0x00007FFE0C910000-0x00007FFE0C920000-memory.dmp

    Filesize

    64KB

  • memory/2848-14-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-6-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-26-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-27-0x00007FFE4EEAD000-0x00007FFE4EEAE000-memory.dmp

    Filesize

    4KB

  • memory/2848-28-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-29-0x00007FFE4EE10000-0x00007FFE4F005000-memory.dmp

    Filesize

    2.0MB

  • memory/2848-1-0x00007FFE4EEAD000-0x00007FFE4EEAE000-memory.dmp

    Filesize

    4KB