Analysis

  • max time kernel
    136s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-11-2024 06:23

General

  • Target

    84fe78eebf9d3e4a7d5ea36ac0dca3ea926026764390bcbff9b3de4dc81fa9f8.xls

  • Size

    226KB

  • MD5

    6f33ff937e092a7ee9007c0e33bdccc1

  • SHA1

    c18fc6844914bd921640c30bf56fc53d063f7269

  • SHA256

    84fe78eebf9d3e4a7d5ea36ac0dca3ea926026764390bcbff9b3de4dc81fa9f8

  • SHA512

    8509ff222e9a4cbb17151717de26cd1b04b64f0069d8138df013f6cb4162083fb4f53a7cb873d818159d18517248470138ac2a7c6d7e2bb78dd04ea13537606c

  • SSDEEP

    6144:hxEtjPOtioVjDGUU1qfDlavx+W2QnAiSFrpS3y3jKdbQ3hn1n58P2fXLHbm4/ij:kIVSib51a8Xrb5/4iPX

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\84fe78eebf9d3e4a7d5ea36ac0dca3ea926026764390bcbff9b3de4dc81fa9f8.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2436

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2436-1-0x00007FFDE212D000-0x00007FFDE212E000-memory.dmp

    Filesize

    4KB

  • memory/2436-0-0x00007FFDA2110000-0x00007FFDA2120000-memory.dmp

    Filesize

    64KB

  • memory/2436-3-0x00007FFDA2110000-0x00007FFDA2120000-memory.dmp

    Filesize

    64KB

  • memory/2436-2-0x00007FFDA2110000-0x00007FFDA2120000-memory.dmp

    Filesize

    64KB

  • memory/2436-4-0x00007FFDA2110000-0x00007FFDA2120000-memory.dmp

    Filesize

    64KB

  • memory/2436-5-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-6-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-7-0x00007FFDA2110000-0x00007FFDA2120000-memory.dmp

    Filesize

    64KB

  • memory/2436-9-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-8-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-10-0x00007FFD9F9E0000-0x00007FFD9F9F0000-memory.dmp

    Filesize

    64KB

  • memory/2436-11-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-12-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-14-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-13-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-15-0x00007FFD9F9E0000-0x00007FFD9F9F0000-memory.dmp

    Filesize

    64KB

  • memory/2436-16-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-17-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-18-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-28-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-29-0x00007FFDE212D000-0x00007FFDE212E000-memory.dmp

    Filesize

    4KB

  • memory/2436-30-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB

  • memory/2436-31-0x00007FFDE2090000-0x00007FFDE2285000-memory.dmp

    Filesize

    2.0MB