Overview
overview
10Static
static
38200755cbe...33.exe
windows10-2004-x64
829c7e87350...5b.exe
windows10-2004-x64
349cccd30a5...90.exe
windows10-2004-x64
3b17911ddea...82.exe
windows10-2004-x64
302ca4397da...51.exe
windows10-2004-x64
3022aeb126d...74.exe
windows10-2004-x64
9smb-7teux2sm.exe
windows10-2004-x64
9smb-onil0o36.exe
windows10-2004-x64
9malware-sa...ab.exe
windows10-2004-x64
10malware-sa...1).exe
windows10-2004-x64
malware-sa...n.xlsx
windows10-2004-x64
1Analysis
-
max time kernel
131s -
max time network
256s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2025 11:07
Static task
static1
Behavioral task
behavioral1
Sample
8200755cbedd6f15eecd8207eba534709a01957b172d7a051b9cc4769ddbf233.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral2
Sample
29c7e87350cb03428fc108b03856095b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
49cccd30a564410d1f9bbce89fa15890.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
b17911ddeab973db51362721c940d882.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
022aeb126d2d80e683f7f2a3ee920874.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
smb-7teux2sm.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral8
Sample
smb-onil0o36.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
malware-samples-master/Ransomware/Grandcrab/grandcab.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
malware-samples-master/Ransomware/Petya/4c1dc737915d76b7ce579abddaba74ead6fdb5b519a1ea45308b8c49b950655c (1).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
malware-samples-master/mitre-attack/Emotet+Trickbot_comparison.xlsx
Resource
win10v2004-20241007-en
General
-
Target
malware-samples-master/mitre-attack/Emotet+Trickbot_comparison.xlsx
-
Size
14KB
-
MD5
248cd700a82449f4b0d107e6a934ae2b
-
SHA1
d1763d827d614ddd6f3ca046ec6d1cf880f4dc25
-
SHA256
6ff88255226a7f0de338e8383904a6fd8af5eb630c28ae6846b107de41fa22ef
-
SHA512
c5755cc015b3e6aa30ce1c87c05a7712fc7939f57d7d470025a50c8d280ad53d97701f34b85b8f9300652989720915ccac28a22925e73ea48455116f37c31746
-
SSDEEP
384:YlbZERmunyjfOOTXC6ACMYMx3pF5dBwDVfJZKTvazDpzQ:OdunyXXC6jzqTKVxZ7zDC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString POWERPNT.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily POWERPNT.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU POWERPNT.EXE -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 4036 EXCEL.EXE 3932 POWERPNT.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 4036 EXCEL.EXE 3932 POWERPNT.EXE 3932 POWERPNT.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\malware-samples-master\mitre-attack\Emotet+Trickbot_comparison.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4036
-
C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE"C:\Program Files\Microsoft Office\Root\Office16\POWERPNT.EXE" /s "C:\Users\Admin\Desktop\ResolveDisconnect.pps" /ou ""1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Office\16.0\WebServiceCache\AllUsers\officeclient.microsoft.com\B39827ED-BC2F-41EB-8CD4-BB862BB674AF
Filesize177KB
MD58678e6e6ba297f0870618d262a6193b5
SHA1986100b8762a185c28a39ce25a81a18b2df8ff02
SHA256cb4eed1356794ed167662cedabd7634440900e58ab00f3a594d2a95ce9756067
SHA512ac2ad95db376005df8d438e35f726f7403279052d5c978de77cbfb4e735b9b2b8a56a9dbd22f43c7d9894750357f0294ad76a83efd1461290c80c8abe0b0cc26
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\089d66ba04a8cec4bdc5267f42f39cf84278bb67.tbres
Filesize2KB
MD5beb04f4eae8c5a7d246ea03003c2636c
SHA14d43f0339450121b741b4347e5b4713b2622b11a
SHA256f0bc7b460f9bc44d2a4dfc83c418fac64f2d70e4475ece90557c8e792763d443
SHA512b17390cb3e7222f6de3194a5bed5fd4d29edbe56811acc251dc4144aac9cf19074a28cd18cdaf8a4cb9f20e943968f04d57f55535ec0aa1e49aa7b1dc8517ff2
-
C:\Users\Admin\AppData\Local\Microsoft\TokenBroker\Cache\49dbe2955480c7f6ef8cec9c4320c9868d9293fd.tbres
Filesize2KB
MD5308776a5b7a637efdfca76f5959328f3
SHA121f3b80672c462ddc1ceafc9620a04f479a69ac8
SHA25627dc2a66322ebfdee42c9e2b74acb671e68717ba26310b36bd0a74dfd2dc1d73
SHA512b2ca2a57e27214465972141404efd29aae75cd93f0a80269a9503b01282ac2915c437d1b33292710ec4107fdadce85c791e1c6bc465792353561b5104e40a206