Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:17
Behavioral task
behavioral1
Sample
14E11B88.xls
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
14E11B88.xls
Resource
win10v2004-20241007-en
General
-
Target
14E11B88.xls
-
Size
29KB
-
MD5
9fba7fbd5906be19a22a8df0baea3f8e
-
SHA1
6648d7997e3af6f190022dc7dbe4bb5781bc5905
-
SHA256
fab850a4a5c67c038babb9892f805555ae07e95a922577085f56ff810eedf876
-
SHA512
af9497508f6b887ddea0da603e63e876286e3a239aec57051de9f1812728a3e1f9492c10fab9c642c16be8fd358340fded723b8a066aba57b1f8f5c86a353be1
-
SSDEEP
384:uvSof29taGeqt57hWG7ASVHjHmZHiTWMXBw1HSdb:Vof23aGeqt57hWG79HbY62wb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4052 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
EXCEL.EXEpid process 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE 4052 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\14E11B88.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
907B
MD575b8ae072b04a350b1df39d1f2e2ece4
SHA1364363a151a86f85f49b8cf272bf63c05355835c
SHA256d85d7b346cc4912ab4092b269aaa9864d0e1aa67b52e0cfacf711df9d0427747
SHA512f7ef701fe056954d9d4a08ed0a397a3326c5fe8ecb704a47c1631ff2a9235a9be2a4865f1fa8b433872e7631e0cd76a0739b3b6407c704741f5bd05705556ca0
-
Filesize
8KB
MD546edc2d2b7f7076e6ae9caff9d6e85fa
SHA1d79e3823e7486a12ce966d1d0892fa163815be21
SHA256fa9dda78177a478ca036543774a854c7784425f77251f67734f9a9e7a2583442
SHA512c86d0ce3e74ddb6a06bc1896c258adafe65ccf473b1d33a202f6568df8aa93acc0877f599724f0bc6cd5dc070329b970a13da1a258f317e663beeae65db36c76
-
Filesize
8KB
MD5819d6c4e01b80097040b52edaf097790
SHA13de533caac82c768308e157de6944b7c6d3a5ed3
SHA256fe176bf9f8eb1f27ca36ac41e52e5a603766a30eb2385c612141b9c5e8857e00
SHA5123ac6301daa5f3b8cf305ee6d6cc5f808c0355b9159631bace66ec9313de709d95920f3d0e2fdfc2faac9e4b0dc65111f381ceee82896930969b85299239c0075
-
Filesize
326B
MD5d54689b1c8beb699fd3d6ba5dcac4ea9
SHA13017799eff7727fd2b17a571085af429778607a3
SHA2565fb189ea85d0d2458163b6e03fbeca16cee1f7ac8093fe28dd23c8dfa36860df
SHA512d4bb4f2490de7f5cddfc71715dbec37b18b5d1d6f843a0f487149f36c03fbd1f87df9f50645227d398abb44708226fedad6d99693b4600fbc9653bcf9adc9fd8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5b146489d3a228e87e2d97a499df01f60
SHA1ae2e56f15bf3d251e497cab10ffbff573e38141b
SHA25642b0adcb75a1299a6554099b4969a9a0cc6f263dfbea76b601191403256a5c10
SHA5122c1321db76d3e075a1f7ecc2223bf233c086fb74434484edce512105ddbf90cc6f2a3514f99b74888dc2256a678e98b22956fc89222db7c7e37b49beef226eb0