Analysis

  • max time kernel
    133s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2024 09:55

General

  • Target

    OTTIMAX RFQ BID1122263.xlsx

  • Size

    1.1MB

  • MD5

    61b68ed859f55e970b3b4b49e6aa3890

  • SHA1

    0621ceca3448c427848777e383c9b9d9549fde21

  • SHA256

    8447a77109db948caf2aeab8f22ecffb5fb15a83286c7894b0d9a06c48ed3e73

  • SHA512

    1ead6f9dc9428d47aa9419dc6ba1c2f753806b93df893114e3baf06c067c78667b4ccb37af5554f626ddc84dd91ab21025346243df9cb6c9d34485b537b7a11f

  • SSDEEP

    24576:DxmdOBUO2GqbAq+zyFGbTgV/S9MLk2zP38rkwuX+au+H:lnq8qGoIgGck2roNuX++

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\OTTIMAX RFQ BID1122263.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    0282037db65e77a462cc8eb0d76bbf14

    SHA1

    4b7adadb83f623727f593fd9e5467aff54488ef1

    SHA256

    9cbb303ee741c67146352e826bad5ba9ad60e5ee56c3aaa456359f62227daefb

    SHA512

    82dfa5d854a38ccdb4b5d7c298d91c0d369a83350e262a9c4f80d78df12627f632bd18e4ae037eccbb077041a0c281376453e9c0bd9e541695b06a13d768429f

  • memory/2784-11-0x00007FF8732B0000-0x00007FF8732C0000-memory.dmp

    Filesize

    64KB

  • memory/2784-2-0x00007FF875C10000-0x00007FF875C20000-memory.dmp

    Filesize

    64KB

  • memory/2784-9-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-4-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-5-0x00007FF875C10000-0x00007FF875C20000-memory.dmp

    Filesize

    64KB

  • memory/2784-6-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-7-0x00007FF875C10000-0x00007FF875C20000-memory.dmp

    Filesize

    64KB

  • memory/2784-10-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-1-0x00007FF875C10000-0x00007FF875C20000-memory.dmp

    Filesize

    64KB

  • memory/2784-3-0x00007FF8B5C2D000-0x00007FF8B5C2E000-memory.dmp

    Filesize

    4KB

  • memory/2784-14-0x00007FF8732B0000-0x00007FF8732C0000-memory.dmp

    Filesize

    64KB

  • memory/2784-8-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-15-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-17-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-16-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-13-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-12-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-27-0x00007FF8B5B90000-0x00007FF8B5D85000-memory.dmp

    Filesize

    2.0MB

  • memory/2784-0-0x00007FF875C10000-0x00007FF875C20000-memory.dmp

    Filesize

    64KB