Analysis
-
max time kernel
48s -
max time network
45s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-11-2024 21:47
Static task
static1
Behavioral task
behavioral1
Sample
5e45c73a32cab5efa7196095c8842acb4ba13ce974e96f8190dd6ad0dd819f1e.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e45c73a32cab5efa7196095c8842acb4ba13ce974e96f8190dd6ad0dd819f1e.xlsx
Resource
win10v2004-20241007-en
General
-
Target
5e45c73a32cab5efa7196095c8842acb4ba13ce974e96f8190dd6ad0dd819f1e.xlsx
-
Size
2.2MB
-
MD5
dcd0d55f67330db999c89471cd01aa8f
-
SHA1
d994c44da5b32cdbf51917de57ed78968feaa639
-
SHA256
5e45c73a32cab5efa7196095c8842acb4ba13ce974e96f8190dd6ad0dd819f1e
-
SHA512
36da20e927fe523e6926a41efad0052a37e706a6f934c3e9495b0b2764ae179e2027c72e81919a037a71ce4b99063c6b20b929f57a182111726968085954bf00
-
SSDEEP
49152:4xfNNNNNNrv7RQKckqaI4WOhyHaAdAVG4dM3aQSsyhgKm7PXiQsWpdC:0VTeaIEocV7gCHmKkq/
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 2088 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid Process 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE 2088 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5e45c73a32cab5efa7196095c8842acb4ba13ce974e96f8190dd6ad0dd819f1e.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2088
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize4KB
MD536c7e85fb21646ff8abd2bd3d4040268
SHA1ed57afd192cfb12d6333725b206061fba770fd93
SHA256a87c61e3caa41f0f13aa777c654ab46f919f4fa16c1bc4be187d3959590e0692
SHA512afc1b3b0c1d86ea0d8a77c56aaaa3be3255deb9aa31e23a362078cde1d0742fe9006d8be7a12c743936aff908d409864eecf3d23fa1a164ffdca98e693d7fe49