Analysis
-
max time kernel
299s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 01:44
Behavioral task
behavioral1
Sample
ORDER-24121645908FC.jar
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ORDER-24121645908FC.jar
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Order.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Order.xlsx
Resource
win10v2004-20241007-en
General
-
Target
Order.xlsx
-
Size
7KB
-
MD5
d7da42ab256e992e632f95e99234de24
-
SHA1
0af717df408db405c3e8f5a3760c69a74accc6c1
-
SHA256
1db27ba068c8cb6b78d9f97e9f3263dbac5449785b3531a19725ceaa291b2395
-
SHA512
5e0965ce30f833582f27adbd9d042528a18d7ed0be92b6b7ec60249f59f1715b02493960a766644f01807a24666224c19fcaafea3538d0a4096f4b79f20353cb
-
SSDEEP
96:lYAgwkW0YWuQTy4wcKDtFEB7wHSn862Z3KA5TI6Uwgj0qFoXDfYxRgZ9AXH:TghuQTSBhFEBPJ2Z3KmMZMDYcoH
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1120 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE 1120 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Order.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1120