Analysis
-
max time kernel
57s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:35
Static task
static1
Behavioral task
behavioral1
Sample
LeaveIntermittent_30510510_64121_ROBYN_FOSTER.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
LeaveIntermittent_30510510_64121_ROBYN_FOSTER.xls
Resource
win10v2004-20241007-en
General
-
Target
LeaveIntermittent_30510510_64121_ROBYN_FOSTER.xls
-
Size
21KB
-
MD5
95d4fc5963b805e599754ecce5572efd
-
SHA1
da1ce15759c543a6577bfa838fe29760b4211ea2
-
SHA256
f7f2eabc237a40a3ed617136b40f6738be69cd26065ce24f6f33242750426086
-
SHA512
d00048539e33a26a732ba3243fc07da19e5381d21f888a05696466b651a5d2b9ceb08b51977ae48393839c1b7ebf0398d4a93875627cc9d9e1b714a4b4ef7998
-
SSDEEP
384:Jx3b9LLRVwXny2KkXA0vV/pJQRNctiFLd3B03i:nZfR2OkXA0vV/pJQXGi
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3004 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\LeaveIntermittent_30510510_64121_ROBYN_FOSTER.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5f4fb7c7fe60bc63cde047bb31b05566a
SHA17006c16234686ef08ccbbe634d740e6c346e5524
SHA2561f9b29f2a0a08f3b4534b035c5da05876ac1d72b65e8f73175910f65af1110aa
SHA51253bea10ebe3083de5a6eb44ae06580ea4ce692d12076088518abac1ec435c421d122cd984bab8d993c600df55d3d1cf1eadc6d06cfc416386e66c46aaf04a608