Analysis
-
max time kernel
47s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 22:00
Behavioral task
behavioral1
Sample
9f8e9ff77447d4c5982fac0729af52bc2c02f992a2b236eff6935d2282a273ba.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f8e9ff77447d4c5982fac0729af52bc2c02f992a2b236eff6935d2282a273ba.xls
Resource
win10v2004-20241007-en
General
-
Target
9f8e9ff77447d4c5982fac0729af52bc2c02f992a2b236eff6935d2282a273ba.xls
-
Size
371KB
-
MD5
cbf8a1efc4ee82a2ceb227aa4f809a41
-
SHA1
8c3999c0556241d808e5fd66c24227af208f5d78
-
SHA256
9f8e9ff77447d4c5982fac0729af52bc2c02f992a2b236eff6935d2282a273ba
-
SHA512
a914de5017403e02d5608ade64238f92b46fc5ba4f3573b856aca2f3e543367c681731752f8477783ae797bfba7de438d276b0bcd578d7b6c0c298a799081a7f
-
SSDEEP
6144:xxEtjPOtioVjZUGGnwfDlavx+W+LIfnAlnzOUL1cMQTciFEcLGRk8gpJgtaqviGz:PnzOUL1cMQQADptSEdqFP9mSizYf/xv
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1220 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE 1220 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9f8e9ff77447d4c5982fac0729af52bc2c02f992a2b236eff6935d2282a273ba.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1220
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a0081638c4b5e329dbe906bd4bfb02e1
SHA15d1fd5819b3ce6db953ae6853a10367a49b486ba
SHA256a6f1c4571588c84e9e45e01b318a378ecd6f033025b75823ddaa5a78d5a7c605
SHA5123a539f9a177b15a837c2809fad35438259a8fd88ae73782e8d4bec31c3b9e97c2ab21c6bac23c619fa7bb37a3fc8e5d298d79f2516148ac904068ec1f74b0841