Analysis
-
max time kernel
13s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 21:28
Behavioral task
behavioral1
Sample
883f8a61824451a55c375d7ba9834aa3f9abe089aa6c16b45d42aed60c9ae6c5.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
883f8a61824451a55c375d7ba9834aa3f9abe089aa6c16b45d42aed60c9ae6c5.xls
Resource
win10v2004-20241007-en
General
-
Target
883f8a61824451a55c375d7ba9834aa3f9abe089aa6c16b45d42aed60c9ae6c5.xls
-
Size
590KB
-
MD5
8c954e54c8fc867351868f9625b26985
-
SHA1
67c4309906205c9eaad5223294c8e3d9534b3a6d
-
SHA256
883f8a61824451a55c375d7ba9834aa3f9abe089aa6c16b45d42aed60c9ae6c5
-
SHA512
b53431eb04ed7477dc70292abc3471d4b4ff75397c22c6d2dd058a0840ef889ea5cbb06fe102ee099d20c0caf3e79e33b5e17c99d465cc696503318fa9a45016
-
SSDEEP
6144:+k3hOdsylKlgxopeiBNhZF+E+06g9AI9IRCA5IMZ/776bAXlsfajX5foeNtqEZDM:FWCA5R/75lsfar5AeNtpZD
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1256 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1256 EXCEL.EXE 1256 EXCEL.EXE 1256 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1256 wrote to memory of 2380 1256 EXCEL.EXE 30 PID 1256 wrote to memory of 2380 1256 EXCEL.EXE 30 PID 1256 wrote to memory of 2380 1256 EXCEL.EXE 30 PID 1256 wrote to memory of 2380 1256 EXCEL.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\883f8a61824451a55c375d7ba9834aa3f9abe089aa6c16b45d42aed60c9ae6c5.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2380
-