Analysis
-
max time kernel
16s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 21:45
Behavioral task
behavioral1
Sample
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls
Resource
win10v2004-20250217-en
General
-
Target
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls
-
Size
205KB
-
MD5
be533fca0338d2fd1d064acc4eb37705
-
SHA1
a32d3f01b50f192503149d216179208ecc836200
-
SHA256
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264
-
SHA512
ad696827e723baeaa29d0a74160020e14a8a8eef7476d9a4394387547c318c1c6edad8032c0fc9b0a0f69c2283574b52248f2bdaf9735bdcba9c30f947d890e6
-
SSDEEP
6144:S9k3hOdsylKlgryzc4bNhZF+E+EgwKYAdP+AK9oEU:SpK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2392 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2392 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2392 EXCEL.EXE 2392 EXCEL.EXE 2392 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a950fcfb38c4bd2aed2ab8de725d0c4f
SHA193b21283abc042f7b21a78a4551e98a96bff73a3
SHA2565474b6db2ec8267733054de176aa0096e5d4a6e656dc9d8766c810528ac8b5c1
SHA5122ef190c0e1542bcec78f27719b42579fd0f5bb0b3c538c1e8ed3619266b018ba7185e3cf2c2b5a1b6b34cb217596f3e184a6116f418b7792d5d034dcb9915be4
-
Filesize
368B
MD5ab4d8c23360bcdcfb01c64912f201945
SHA1f8bef630c020de8e97e5febf741dd787f4b53082
SHA2566a9b2e388a9f45203991198245b385c2f3fa20b9e396b7e2009a3f88d7aa516a
SHA512c5f75d06922c8515eefd3f84b56a37e4fbb395b469250a75dfdccfaf11ce908293234f915fa7ce4f3a18e55db5d6c4c22abb53397111b5c85bec0ab29bca7582