Analysis
-
max time kernel
17s -
max time network
21s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 12:19
Static task
static1
Behavioral task
behavioral1
Sample
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
Resource
win10v2004-20241007-en
General
-
Target
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
-
Size
1.4MB
-
MD5
88f068751d671c40053bdf391c237bd5
-
SHA1
0885f4d1befb6c12afa526769d6c25ae398412ab
-
SHA256
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6
-
SHA512
4a9d265e88c98ecee75e8ff01904a618a86c5a315a6095899efa1e98e541a97a54c1097da9243a7b5b0fab13d640d356c8b42c8ff8a6fe0a609ee13558c85253
-
SSDEEP
24576:JutNHbejV7LluSPKUn+Yw7P20aJRhq+0WBSxJ8sUJjlHcs+0ZlX81kt2i1Pe7Kj:UfHbGRPV67ujzBInUvHwB+Iixy2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE 2060 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5954b87a9243cd1ee8fd4bff1231e8850
SHA140001a01adadf3869d2d3f729b02aa0d8c5e7172
SHA256d1030749491432802d4607fe966700e40cbd33c920a3eefea1c4fd4d80defd3c
SHA51220b326400a52946e45ea5190b50df2972bbf8b3112a4bff86698065e872865137b148bcfb6df55520935e0312c80b07d3d7dc304081acedd828834dc70e31a70