Analysis
-
max time kernel
15s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
07/03/2025, 21:49
Behavioral task
behavioral1
Sample
5dd1c825d9bce0058f2253a10669354127e8a0c3ef92a929a3cf0d4ee3c7447a.xls
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
5dd1c825d9bce0058f2253a10669354127e8a0c3ef92a929a3cf0d4ee3c7447a.xls
Resource
win10v2004-20250217-en
General
-
Target
5dd1c825d9bce0058f2253a10669354127e8a0c3ef92a929a3cf0d4ee3c7447a.xls
-
Size
205KB
-
MD5
b8b248031632f87a80cb616f30d9e6cd
-
SHA1
426c32f75fb64b42fbd1e76571298003f522819d
-
SHA256
5dd1c825d9bce0058f2253a10669354127e8a0c3ef92a929a3cf0d4ee3c7447a
-
SHA512
7e5eb3192a5904c12101ff1bd47de02170ac7810de6760f6cbae9aaafcbabb28293241fe430b9baa477f98c981c03fdeb1289a2b1e02aef1bb627ac369d4976c
-
SSDEEP
6144:j9k3hOdsylKlgryzc4bNhZF+E+EgwKYAdP+AK9oEU:jpK
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2988 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\5dd1c825d9bce0058f2253a10669354127e8a0c3ef92a929a3cf0d4ee3c7447a.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a950fcfb38c4bd2aed2ab8de725d0c4f
SHA193b21283abc042f7b21a78a4551e98a96bff73a3
SHA2565474b6db2ec8267733054de176aa0096e5d4a6e656dc9d8766c810528ac8b5c1
SHA5122ef190c0e1542bcec78f27719b42579fd0f5bb0b3c538c1e8ed3619266b018ba7185e3cf2c2b5a1b6b34cb217596f3e184a6116f418b7792d5d034dcb9915be4