Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll
Resource
win10v2004-20241007-en
General
-
Target
2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll
-
Size
130KB
-
MD5
f5c5e1f7b2fda6346989fc1bbe6b7657
-
SHA1
6f2d97035993d41b2f3867fa657a3b06cb67929b
-
SHA256
2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32
-
SHA512
d245ebf51129f4abf3e3bae94583d51ada5104ae0c98ad370163e93c54f6ba8fa427b044352068ce9e3b2fe00caea8f1d2f2684401e10289574f8f5d9dd0dbfd
-
SSDEEP
1536:n5LZElpqZElpuqnAJcFUg+Rxp87eQWBfrHxgAMYvtp40n:nrYEYITCig+oOfrH2nYt7
Malware Config
Signatures
-
Loads dropped DLL 1 IoCs
pid Process 2504 EXCEL.EXE -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2504 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2504 EXCEL.EXE 2504 EXCEL.EXE 2504 EXCEL.EXE 2504 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2504
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Local\Temp\2680d7aabaaa6a9bf3e961097a7525bb597c55b8ac8ed8148d66338d78bf4c32.xll
Filesize64KB
MD561502e2f792650acd1f7a209f7a3fb46
SHA121d8b7d5cf92bc60bf049fc2a0fa0368b7fef4fb
SHA256b9b4f7a127fe3f43f122bb903fef9a3c8ed0ea1cdf4242d72f6ec3a0c6234f99
SHA512925db8839439782d4cf8fd1e38969e38a9fd6ca4c8530d7518fbae185471d3f29b90774a2acd9e29d9e9812e68cb6ac2f792581110a5886022f58c4b782f287f