Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 21:38
Static task
static1
Behavioral task
behavioral1
Sample
22e548e51e503a2413dd76d786eda4be774723cc305d155318a1e525c18a26a7.xll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
22e548e51e503a2413dd76d786eda4be774723cc305d155318a1e525c18a26a7.xll
Resource
win10v2004-20241007-en
General
-
Target
22e548e51e503a2413dd76d786eda4be774723cc305d155318a1e525c18a26a7.xll
-
Size
1.5MB
-
MD5
91a1f665769e60d18b69592799448780
-
SHA1
b7dfb6bb2381bfbf639965d0930a7b34e7cf83fa
-
SHA256
22e548e51e503a2413dd76d786eda4be774723cc305d155318a1e525c18a26a7
-
SHA512
5615f2c73e5e40363b817affcea41afd913347f76ad104f4e4acc3d45f207df7d2312e5834c6d88f423ff09051ed8ace1368ea465662c7374a7d3a3ba1926e95
-
SSDEEP
24576:Mvgy0ZQNOd69dmnX567paBvI7cO+4vVyACfoJQk2A4AhMg9p6w6ilfJW/:Ugcwdy1gBvY+4dqoqk2AigaHilfq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 448 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE 448 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\22e548e51e503a2413dd76d786eda4be774723cc305d155318a1e525c18a26a7.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD51e90ec35d094816b1ec8615715d5211e
SHA12c2933258c52e1c7100e6b1fb6df8c699237dcfd
SHA25692f09bf4631f05045b39ea1edfba361d2b67fc24582ac8fe3cffa7d156365975
SHA512df0c5d264a2b04dd97eca783c5c412157a5f0eef705bda458956462b7ad4c20d2fe13b83caec16f2c34ef4308e8a2a2da6e76b9da2b8e788bceedf02c5828ac9