Analysis
-
max time kernel
47s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2025, 21:45
Behavioral task
behavioral1
Sample
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls
Resource
win10v2004-20250217-en
General
-
Target
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls
-
Size
205KB
-
MD5
be533fca0338d2fd1d064acc4eb37705
-
SHA1
a32d3f01b50f192503149d216179208ecc836200
-
SHA256
cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264
-
SHA512
ad696827e723baeaa29d0a74160020e14a8a8eef7476d9a4394387547c318c1c6edad8032c0fc9b0a0f69c2283574b52248f2bdaf9735bdcba9c30f947d890e6
-
SSDEEP
6144:S9k3hOdsylKlgryzc4bNhZF+E+EgwKYAdP+AK9oEU:SpK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3668 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE 3668 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cfa879cf0a4e4d771307f7b5d802156270de22be2aa0a7b5ab25d131487b2264.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3668
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a950fcfb38c4bd2aed2ab8de725d0c4f
SHA193b21283abc042f7b21a78a4551e98a96bff73a3
SHA2565474b6db2ec8267733054de176aa0096e5d4a6e656dc9d8766c810528ac8b5c1
SHA5122ef190c0e1542bcec78f27719b42579fd0f5bb0b3c538c1e8ed3619266b018ba7185e3cf2c2b5a1b6b34cb217596f3e184a6116f418b7792d5d034dcb9915be4
-
Filesize
393B
MD55122a1376a03c0dcf3e77b795f83a3ee
SHA1b1258e4a08038c9b13ff498cbd84b7cc4d011981
SHA256eeeebaedf82f60cd6a94c875492933b81a8060af0692b67bb8f0c7dd27a01371
SHA51210fca839a53819a070790fe66b65f72570b1e5a1e3bc8def199e8bc859d81292247a19c7eaa5072be99b89cd4fba82a0d9acb7f26f5400b0b0ae45bbce31badc
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize671B
MD51e66d3b776aefe56f4e5b75d9abea883
SHA1700c8699949bfb846b237ae7ec3b2f771714ef8f
SHA25610d5fcc1954baf5079655d6fd794c64bc37512a87cfce231d290f4ed3c765734
SHA512aaf5b227e9bd7d8bda3f389cca440320230f5a8e745da36372d72471627283904b5d14fd1d67d254632aa6f79024cfa2a94d18ead92d4d880f7ef6caedc12ea9