Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 13:34
Behavioral task
behavioral1
Sample
ORDER-24121645908FC.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ORDER-24121645908FC.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Order.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Order.xlsx
Resource
win10v2004-20241007-en
General
-
Target
Order.xlsx
-
Size
7KB
-
MD5
d7da42ab256e992e632f95e99234de24
-
SHA1
0af717df408db405c3e8f5a3760c69a74accc6c1
-
SHA256
1db27ba068c8cb6b78d9f97e9f3263dbac5449785b3531a19725ceaa291b2395
-
SHA512
5e0965ce30f833582f27adbd9d042528a18d7ed0be92b6b7ec60249f59f1715b02493960a766644f01807a24666224c19fcaafea3538d0a4096f4b79f20353cb
-
SSDEEP
96:lYAgwkW0YWuQTy4wcKDtFEB7wHSn862Z3KA5TI6Uwgj0qFoXDfYxRgZ9AXH:TghuQTSBhFEBPJ2Z3KmMZMDYcoH
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 640 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE 640 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Order.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:640
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ab4062989d25d924b8fd37c3a0f00a4f
SHA112bef10bfde20a626d6bd464159e006dc0152834
SHA256f62744998822b0cf87be6b61637fec05693bb2811cfa0173ec48c2d8606d0509
SHA51254d1b636b4c2f75c6bd57a3f22868ec6625a975bca111becc84075ee3ffdca20579e824563522b6b0b496997b1490d001bf5c1e71a0d5ca800eab0dc97405bc4