Analysis
-
max time kernel
133s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 19:08
Static task
static1
Behavioral task
behavioral1
Sample
Free_Proxy_List.csv
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Free_Proxy_List.csv
Resource
win10v2004-20241007-en
General
-
Target
Free_Proxy_List.csv
-
Size
16KB
-
MD5
4e71112e70a0ece9f2ff19409c9b4ba6
-
SHA1
1f72404ed2428e786a6b505c41e0f9e61c4afd9f
-
SHA256
58d07509730781a051614f1603083690fa4401edda6f8343a7bc8b22b016cb01
-
SHA512
1eaa55643f3a878bf7ffe1127952ae57e89494521c375bb7eedd8436efdb35accc04ad7a2468befb103d2212c139cdb445e5ee417cefe181dfe62ecb36a15fc8
-
SSDEEP
192:ZWkf4jsoxXQqIK+AD4dIH7/s6VSOBHVwFJON4k4lsrMjLbqcJru48b6M2iG:sOgzxoK+aH7/tVStw4dlsw6cBlM6MPG
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 548 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE 548 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Free_Proxy_List.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:548
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD57ce77b22a1ac221ccb27fac1da5c0bd4
SHA1a1d0e8832527d1b451fecfddeab4eca63658b819
SHA2569a02163345e603839ebdebf241bc49176750fdb7705c0b302f31a83e67c3707f
SHA5121187b615113d1415c407e30abc5ffdde5c6289aae63586de755d8772118f3db39ba0dd12e5c415e5e9fa3519329381d476f713424b64de08d23914d06bd86bd9