Analysis
-
max time kernel
51s -
max time network
52s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-01-2025 21:22
Static task
static1
Behavioral task
behavioral1
Sample
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
Resource
win10v2004-20241007-en
General
-
Target
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx
-
Size
1.4MB
-
MD5
88f068751d671c40053bdf391c237bd5
-
SHA1
0885f4d1befb6c12afa526769d6c25ae398412ab
-
SHA256
3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6
-
SHA512
4a9d265e88c98ecee75e8ff01904a618a86c5a315a6095899efa1e98e541a97a54c1097da9243a7b5b0fab13d640d356c8b42c8ff8a6fe0a609ee13558c85253
-
SSDEEP
24576:JutNHbejV7LluSPKUn+Yw7P20aJRhq+0WBSxJ8sUJjlHcs+0ZlX81kt2i1Pe7Kj:UfHbGRPV67ujzBInUvHwB+Iixy2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3508 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE 3508 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3122e46802fdd1d353960c89b9d2679e5c818d5cf027dff747acd0d0c2aea7b6.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3508
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD54680b5fec855910892cfc8bd26ad0c41
SHA1e89f8c39608fd3a3f590ad25d981a39562d9172b
SHA256bc56d23c1875f94e5d9c913b6180f29fda333766444890f9c4b0c9dc795ae0ad
SHA5124902e8a9e5ef3c3c96dbec07dc57fad1fb8ebbcbc22827170d1992398af3c69f4f97387d37bdc005e5b30334244755352d8433f3bba02a85619eb21d38449bdf