Analysis

  • max time kernel
    133s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:05

General

  • Target

    IoC/Pagamento.xlsx

  • Size

    673KB

  • MD5

    b6f59978c11f425ebb5183d59727c312

  • SHA1

    bb13cb76b17f1902e0f85bc5b6110cdb7396572f

  • SHA256

    f65a02f6a1fa903c6ea78cf264fb7007309b7e4b426a6db94ce2bb9e0a43fb5f

  • SHA512

    533b65c105b985f5037e32b0a7ba9d192877a14a0fd22b9a0b6294a5e1a6f29e04b4a90af481a310ef999d5ca239a0d010c8cd0d36dd1fc8237a2667577729a6

  • SSDEEP

    12288:keudkZeF2+hBDNY3rZ0jCJHETmBPQfE8ZJpqR6K+U2DChL3Ve0BJST4YVwo//GRy:gaZeYqDNY32jiBQfbJG6Y2WhL33I4YV3

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\IoC\Pagamento.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3928

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    a39831091135c657d097c119aa332f43

    SHA1

    b7cb7be6524d14fd4d5555029eafabeedccfc079

    SHA256

    f58469668f577cdda100db90689baf6c9014b332978cd3d377b25f0619a1a070

    SHA512

    9987030f60d73ddc82f202ec954787bd9648edef93883e9f8e42f83f1a5b1a93ba163f783f9971c1b8d817f27b052787b5d17e44ab5a42562b6737a78122f28d

  • memory/3928-14-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-6-0x00007FF9B9930000-0x00007FF9B9940000-memory.dmp

    Filesize

    64KB

  • memory/3928-16-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-7-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-5-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-4-0x00007FF9B9930000-0x00007FF9B9940000-memory.dmp

    Filesize

    64KB

  • memory/3928-9-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-8-0x00007FF9B9930000-0x00007FF9B9940000-memory.dmp

    Filesize

    64KB

  • memory/3928-17-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-0-0x00007FF9B9930000-0x00007FF9B9940000-memory.dmp

    Filesize

    64KB

  • memory/3928-2-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-1-0x00007FF9F994D000-0x00007FF9F994E000-memory.dmp

    Filesize

    4KB

  • memory/3928-13-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-12-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-18-0x00007FF9B77F0000-0x00007FF9B7800000-memory.dmp

    Filesize

    64KB

  • memory/3928-11-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-10-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-3-0x00007FF9B9930000-0x00007FF9B9940000-memory.dmp

    Filesize

    64KB

  • memory/3928-33-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-34-0x00007FF9F994D000-0x00007FF9F994E000-memory.dmp

    Filesize

    4KB

  • memory/3928-35-0x00007FF9F98B0000-0x00007FF9F9AA5000-memory.dmp

    Filesize

    2.0MB

  • memory/3928-15-0x00007FF9B77F0000-0x00007FF9B7800000-memory.dmp

    Filesize

    64KB