Analysis
-
max time kernel
13s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
24/03/2025, 22:16
Behavioral task
behavioral1
Sample
1500afbc19cafab1d65619ffaf14ec2187c681a485717d48c6bb039f99b6b1c2.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
1500afbc19cafab1d65619ffaf14ec2187c681a485717d48c6bb039f99b6b1c2.xls
Resource
win10v2004-20250314-en
General
-
Target
1500afbc19cafab1d65619ffaf14ec2187c681a485717d48c6bb039f99b6b1c2.xls
-
Size
43KB
-
MD5
866a94d966baceb74543aa70b9bd2abe
-
SHA1
5d25beb3122d6321cc8c3b88a4244ab742ed0642
-
SHA256
1500afbc19cafab1d65619ffaf14ec2187c681a485717d48c6bb039f99b6b1c2
-
SHA512
cd56e23c8d412ac4574494cf4e059e9ae5bd84baa846ccd2e849963731c65b8c7212993da7208fc95db819675759ef451fdb77c8222acc1b822166a5c6d60110
-
SSDEEP
768:1+SCMRhft7tviUePsSkECsekS7B7djZ1HvgaBxEtjPOtioVjDGUU1qfDlaGGx+cy:3hft7tviUePsSkECsekS7B7djZ1HvhBp
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2368 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2368 EXCEL.EXE 2368 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2368 EXCEL.EXE 2368 EXCEL.EXE 2368 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2368 wrote to memory of 1320 2368 EXCEL.EXE 30 PID 2368 wrote to memory of 1320 2368 EXCEL.EXE 30 PID 2368 wrote to memory of 1320 2368 EXCEL.EXE 30 PID 2368 wrote to memory of 1320 2368 EXCEL.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1500afbc19cafab1d65619ffaf14ec2187c681a485717d48c6bb039f99b6b1c2.xls1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1320
-