Analysis
-
max time kernel
133s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 10:47
Static task
static1
Behavioral task
behavioral1
Sample
RFQ # PC25-1301.xlsx
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
RFQ # PC25-1301.xlsx
Resource
win10v2004-20241007-en
General
-
Target
RFQ # PC25-1301.xlsx
-
Size
1.4MB
-
MD5
88f068751d671c40053bdf391c237bd5
-
SHA1
0885f4d1befb6c12afa526769d6c25ae398412ab
-
SHA256
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6
-
SHA512
4a9d265e88c98ecee75e8ff01904a618a86c5a315a6095899efa1e98e541a97a54c1097da9243a7b5b0fab13d640d356c8b42c8ff8a6fe0a609ee13558c85253
-
SSDEEP
24576:JutNHbejV7LluSPKUn+Yw7P20aJRhq+0WBSxJ8sUJjlHcs+0ZlX81kt2i1Pe7Kj:UfHbGRPV67ujzBInUvHwB+Iixy2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3908 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ # PC25-1301.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD509460b17dba522a740a675f29ae75e19
SHA1e18f76a2eb4628a37d80ae42228528928ec69fae
SHA2567ba9030a5e8084f23a0cc6726ea2f78a017f86f786ac6eeb8d2ed55910ce21e8
SHA512d5edc2f4546d4027c13bb34720cd84276d66576f19235bea92b6ad4062b8d5aa0ac1a6b7064aef7dba342c532ada6f1a00167e8921a5b17dc55cc2f985fef951