Analysis

  • max time kernel
    133s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/03/2025, 11:50

General

  • Target

    南沙万顷沙镇水窦工程量清单/南沙万顷沙镇水窦/13#水窦/表3—1 封面.xls

  • Size

    16KB

  • MD5

    b8e0608b433b903fa8b477d54224229c

  • SHA1

    8e606cea7f9f820a661340fbe4d145abaf0fccf8

  • SHA256

    ced7f8d7c3bc563e0cc436386301359d6701ef152e46544dad23b1d6743d307f

  • SHA512

    4eae2cc2a1ccda10d7e03644e6002349731001ad1c07940a7c2ec7472617e666d6a699fca6a5588e4f40292880ddaa3700383fc0b52283c680a96d97f65818cb

  • SSDEEP

    96:KYhZ2G2pBOVR2lNIUmdjqYSIZRR6ocvyxKzAcb6RdHeZf0egoT:KYhZ2G2pBWR2THDRvyyWEga

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\南沙万顷沙镇水窦工程量清单\南沙万顷沙镇水窦\13#水窦\表3—1 封面.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:5248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    425b94daa682a398f14b5d0d62be03f3

    SHA1

    227ec08db3d8979e54c92a1218edcf14ed223210

    SHA256

    61e809cf7dac44685c7ec454bd235c7862c202554a47b3166a51240149add803

    SHA512

    27220cb7987d5411d79b30c31cf50691c90b0c37709d97d7576e746bc181f4671d61a01e5c0569738262f2dab82391b09501a8627d54e9db2445869d85d84f20

  • memory/5248-8-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-6-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-2-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

    Filesize

    64KB

  • memory/5248-5-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

    Filesize

    64KB

  • memory/5248-4-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-7-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

    Filesize

    64KB

  • memory/5248-1-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

    Filesize

    64KB

  • memory/5248-12-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-9-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-11-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-3-0x00007FFBA0230000-0x00007FFBA0240000-memory.dmp

    Filesize

    64KB

  • memory/5248-10-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-18-0x00007FFB9D8D0000-0x00007FFB9D8E0000-memory.dmp

    Filesize

    64KB

  • memory/5248-15-0x00007FFB9D8D0000-0x00007FFB9D8E0000-memory.dmp

    Filesize

    64KB

  • memory/5248-16-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-14-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-13-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-19-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-20-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-17-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-30-0x00007FFBE024D000-0x00007FFBE024E000-memory.dmp

    Filesize

    4KB

  • memory/5248-31-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-32-0x00007FFBE01B0000-0x00007FFBE03A5000-memory.dmp

    Filesize

    2.0MB

  • memory/5248-0-0x00007FFBE024D000-0x00007FFBE024E000-memory.dmp

    Filesize

    4KB