Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2025 03:05
Static task
static1
Behavioral task
behavioral1
Sample
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx
Resource
win10v2004-20241007-en
General
-
Target
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx
-
Size
1.8MB
-
MD5
0bb753c9d76544c518ebb5d209108266
-
SHA1
1a7e7c5044c842e03687f576005bd43d48862ebb
-
SHA256
a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710
-
SHA512
21f7ac9b14f16fd758df420c25b952cd1b699c250904781c43ce7080801fefb4dd814c3ee7a30b4a7981deebdcb4fcbc72247fd2c6982be051635bee8565eba7
-
SSDEEP
49152:kTiDS2iZYJTg+uFfcdD+3GkdQFzhccnYmmAQdC:kmugO+6fV3GkdQdnhD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3316 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE 3316 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a106bd015a486b2e0c147b968a3c1616d229290ae520c8b4aeb83b64e6d0a710.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3316
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ec0496c76633f8d2bc009936c3d37d8c
SHA1d2b8debf7a93e5ac358249c3d0eb624106329596
SHA25692003e2bbb18b757070056bbec872015b77b6b347bab98ed5396573f6b1db534
SHA512a0f28d134f3f9983b1d4d45f6050c4cb957419a1cd6a355d9a18c9fa99eae34e94cd89692d266d5a2b32ca8882cb58fa3de714866f3ba61a864c4757e661946f