Analysis

  • max time kernel
    133s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-12-2024 16:25

General

  • Target

    d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254.xls

  • Size

    939KB

  • MD5

    15d90d6aa9eb2c890494884bdaff2e91

  • SHA1

    d55134055fb68cab73e32d6ed70d936399484a3d

  • SHA256

    d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254

  • SHA512

    a4f10b41f37be48b3ddf83e6c0d133cd8ae8655c4a8fac3235be0dc961c5bf2e3e80d6b924b446ba44a07b7bbdbf99d87b308637332bbb050b4c51c25dab5c8e

  • SSDEEP

    12288:xmzHJEjwWYSqD3DERnLRmF8Dl3PTKuG44G24rBedMPQr6eyCQSEB9:gcwHSqbARM8B3ugedV7Q

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d472c895106cfebcb6eea8701416aed96b9770c256432ee7ee7a9b8a60a6d254.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1052

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    0cbea783cf720410d8db2aeddc5548a2

    SHA1

    d116539b254911e353c74be0b3ffe2968de036b9

    SHA256

    753cd00dd55f143396765aaeb8ac5493afa0a45109a162a0b7de022105189bf3

    SHA512

    33bc68cab4096d0fb46a9466d50005f352af2072e0884c75a5a3aff60739c632a9b9de6767614506c5bc6d3c6de66ebfd68ab4e8913d6a2983f6c0c3c71cf6e7

  • memory/1052-9-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-6-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-11-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-0-0x00007FFF49570000-0x00007FFF49580000-memory.dmp

    Filesize

    64KB

  • memory/1052-12-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-5-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-8-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-10-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-1-0x00007FFF49570000-0x00007FFF49580000-memory.dmp

    Filesize

    64KB

  • memory/1052-3-0x00007FFF8958D000-0x00007FFF8958E000-memory.dmp

    Filesize

    4KB

  • memory/1052-2-0x00007FFF49570000-0x00007FFF49580000-memory.dmp

    Filesize

    64KB

  • memory/1052-13-0x00007FFF47130000-0x00007FFF47140000-memory.dmp

    Filesize

    64KB

  • memory/1052-7-0x00007FFF49570000-0x00007FFF49580000-memory.dmp

    Filesize

    64KB

  • memory/1052-14-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-15-0x00007FFF47130000-0x00007FFF47140000-memory.dmp

    Filesize

    64KB

  • memory/1052-37-0x00007FFF894F0000-0x00007FFF896E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1052-4-0x00007FFF49570000-0x00007FFF49580000-memory.dmp

    Filesize

    64KB