Analysis

  • max time kernel
    133s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/01/2025, 19:08

General

  • Target

    Free_Proxy_List.csv

  • Size

    16KB

  • MD5

    4e71112e70a0ece9f2ff19409c9b4ba6

  • SHA1

    1f72404ed2428e786a6b505c41e0f9e61c4afd9f

  • SHA256

    58d07509730781a051614f1603083690fa4401edda6f8343a7bc8b22b016cb01

  • SHA512

    1eaa55643f3a878bf7ffe1127952ae57e89494521c375bb7eedd8436efdb35accc04ad7a2468befb103d2212c139cdb445e5ee417cefe181dfe62ecb36a15fc8

  • SSDEEP

    192:ZWkf4jsoxXQqIK+AD4dIH7/s6VSOBHVwFJON4k4lsrMjLbqcJru48b6M2iG:sOgzxoK+aH7/tVStw4dlsw6cBlM6MPG

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Free_Proxy_List.csv"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:548

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    7ce77b22a1ac221ccb27fac1da5c0bd4

    SHA1

    a1d0e8832527d1b451fecfddeab4eca63658b819

    SHA256

    9a02163345e603839ebdebf241bc49176750fdb7705c0b302f31a83e67c3707f

    SHA512

    1187b615113d1415c407e30abc5ffdde5c6289aae63586de755d8772118f3db39ba0dd12e5c415e5e9fa3519329381d476f713424b64de08d23914d06bd86bd9

  • memory/548-14-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-12-0x00007FFC81480000-0x00007FFC81490000-memory.dmp

    Filesize

    64KB

  • memory/548-2-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/548-7-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-6-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-4-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/548-11-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-17-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-0-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/548-9-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-1-0x00007FFCC38ED000-0x00007FFCC38EE000-memory.dmp

    Filesize

    4KB

  • memory/548-8-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-10-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-19-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-18-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-16-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-15-0x00007FFC81480000-0x00007FFC81490000-memory.dmp

    Filesize

    64KB

  • memory/548-13-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-5-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB

  • memory/548-29-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-30-0x00007FFCC38ED000-0x00007FFCC38EE000-memory.dmp

    Filesize

    4KB

  • memory/548-31-0x00007FFCC3850000-0x00007FFCC3A45000-memory.dmp

    Filesize

    2.0MB

  • memory/548-3-0x00007FFC838D0000-0x00007FFC838E0000-memory.dmp

    Filesize

    64KB