Analysis
-
max time kernel
46s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-01-2025 22:13
Static task
static1
Behavioral task
behavioral1
Sample
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx
Resource
win10v2004-20241007-en
General
-
Target
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx
-
Size
1.8MB
-
MD5
0bb753c9d76544c518ebb5d209108266
-
SHA1
1a7e7c5044c842e03687f576005bd43d48862ebb
-
SHA256
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710
-
SHA512
21f7ac9b14f16fd758df420c25b952cd1b699c250904781c43ce7080801fefb4dd814c3ee7a30b4a7981deebdcb4fcbc72247fd2c6982be051635bee8565eba7
-
SSDEEP
49152:kTiDS2iZYJTg+uFfcdD+3GkdQFzhccnYmmAQdC:kmugO+6fV3GkdQdnhD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2444 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE 2444 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2444
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD51d6a5bd29467e1ce49b529f6b5454a2b
SHA1e7e9d162d22e7e13bd3bce6966dd04149f4d6729
SHA256991319788fb4e2f2c06c78e288a21794d8a1a67465eeea682929bb699f74c5c6
SHA512cb1fea33b62b369cf09c4e3d53a29cd21d2c344a6bb7347e6d21746a61250ef3922ec93901303806cd4a4f4d2a64ce79a843c4ab3c43466772f50a13cbae49e3