Analysis

  • max time kernel
    133s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-11-2024 17:36

General

  • Target

    setfsb/Creator.xls

  • Size

    53KB

  • MD5

    5d3c5f9fe4ca09cebc0386abf47031c0

  • SHA1

    03bb80a37dee81c216f0925c7d6746538c1c0f49

  • SHA256

    f10cc8c2807378b4e60b330011e50cb58a2cebc2763e51ebf0c3de8a8d96a1a4

  • SHA512

    7b4e513f6803cbb532a6e106e9c9c29fbb2e0d836c2fb0472b3e8281501e776801569bbdd5a6668d9ba3c9070fb78ec059ba8fa79bbce54784c32c5fcf3f8082

  • SSDEEP

    1536:PJTv0zKq8cMeXJFLUqOFN3bYmlL/rhclIN:lOKqYyFLU/FxbYmlL/rSlIN

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\setfsb\Creator.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2392

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    770acbd16c3f30f4de8a96a564e03a52

    SHA1

    40d7760376e1d2465683702f8c4eabd506cfc221

    SHA256

    9505a6c9604d8a4bc841f4c2857abcbb9f542b9362d375629beb7afa8fcecfa1

    SHA512

    114ea79c48aa4b5e3cbd654bf9e5a98c6d4e9dedac1f704128b6d77d957a9b46500f2e537e7fcc08fa5777e4272a8c098e2e2dfed8930aeb94c5d7b049eeec1e

  • memory/2392-14-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-27-0x00007FFDBA80D000-0x00007FFDBA80E000-memory.dmp

    Filesize

    4KB

  • memory/2392-2-0x00007FFD7A7F0000-0x00007FFD7A800000-memory.dmp

    Filesize

    64KB

  • memory/2392-1-0x00007FFDBA80D000-0x00007FFDBA80E000-memory.dmp

    Filesize

    4KB

  • memory/2392-6-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-5-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-9-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-11-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-4-0x00007FFD7A7F0000-0x00007FFD7A800000-memory.dmp

    Filesize

    64KB

  • memory/2392-3-0x00007FFD7A7F0000-0x00007FFD7A800000-memory.dmp

    Filesize

    64KB

  • memory/2392-13-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-15-0x00007FFD783A0000-0x00007FFD783B0000-memory.dmp

    Filesize

    64KB

  • memory/2392-16-0x00007FFD783A0000-0x00007FFD783B0000-memory.dmp

    Filesize

    64KB

  • memory/2392-10-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-8-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-7-0x00007FFD7A7F0000-0x00007FFD7A800000-memory.dmp

    Filesize

    64KB

  • memory/2392-26-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-0-0x00007FFD7A7F0000-0x00007FFD7A800000-memory.dmp

    Filesize

    64KB

  • memory/2392-31-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB

  • memory/2392-12-0x00007FFDBA770000-0x00007FFDBA965000-memory.dmp

    Filesize

    2.0MB