Analysis
-
max time kernel
132s -
max time network
134s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
09-11-2024 10:35
Static task
static1
Behavioral task
behavioral1
Sample
overrides/mods/worldedit-mod-7.2.15.jar
Resource
win11-20241007-en
General
-
Target
overrides/mods/worldedit-mod-7.2.15.jar
-
Size
5.6MB
-
MD5
bd0e7cff7896348faab92e43300d0639
-
SHA1
9c52765ca56f917ef8cbafc20e9a4f45c346508f
-
SHA256
17db6b3e94f52d25426684663e1e1846823cbb7907f1c365ac329e5bc7bfaf2c
-
SHA512
2c41dcd9a622f948ed5409eecc485018fbf274945bdd1a9c0fdf4c4954f9a47dc311e6e0f9e445180d8b771e4a40947533d67bd66feb4ab8c8f87c2880dba7ef
-
SSDEEP
98304:wgOZVsn8FBpZbum0Rf7EM/VNcurMbKsMnvZAvLcEGmv60eZcMdBXPN3TkOzit:wgOZW8lZqpRfQM97rMjMvZAzcEJB8cMc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1932 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE 1932 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Common Files\Oracle\Java\javapath\java.exejava -jar C:\Users\Admin\AppData\Local\Temp\overrides\mods\worldedit-mod-7.2.15.jar1⤵PID:3164
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Desktop\RepairSet.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208B
MD50bb60c7ae1d2cf4fec15bb22c92e7f1f
SHA15f7c1cc6209f4519f624c9520b02fb1f206da980
SHA256a352d84b1115fda31bed47cef95c1ade3105f508eefb50bcf892a6a1d1f40518
SHA512296c33776f744aaf6a700f207750eeabc37630238b9a836b1736830d783ad32755da78c6f75ebdbe5576593ba74ecb7fcd76930c829f84188ed90bc64048e2b0