Analysis
-
max time kernel
46s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 21:27
Behavioral task
behavioral1
Sample
a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d.xls
Resource
win10v2004-20250314-en
General
-
Target
a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d.xls
-
Size
110KB
-
MD5
86153bea181caa21d59b0d57925303f8
-
SHA1
70631604404b2eca2a1a3f4dfa2c9a3228157f69
-
SHA256
a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d
-
SHA512
058e74412186226b769222a1305b06cfdff4dccb88437a95cdac3f5552f4c38683dde53fd688fdd61bd3a2a03815e674101638c5e9a7d3b2ccede8dc3f0790ca
-
SSDEEP
3072:9/7uDphYHceXVhca+fMHLtyeGxcl8/dgL6YsFmDJEFB6cn4p55wY5p1VEq:57uDphYHceXVhca+fMHLty/xcl8/dg6A
Malware Config
Extracted
http://oceanbm.ca/hpplo/555555555.png
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2912 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE 2912 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5f130b2d03fa713c1b7b3b743407c6108
SHA1ddc3812ec29aded57cba6a6e694c25707b3533dc
SHA2561a9be2dfb6d419076ac76b323d268028dbf2f5d7ee15d2695eb2def9e21d9812
SHA51244cd5968968f0e58193beacc0c9521801a908cfb8f7eac2ff87620b344aa63c8eba362cf668e85e392cda27c17882477dffb61d8fecd69940be2ad4bed48c436