Analysis

  • max time kernel
    46s
  • max time network
    38s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/03/2025, 21:27

General

  • Target

    a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d.xls

  • Size

    110KB

  • MD5

    86153bea181caa21d59b0d57925303f8

  • SHA1

    70631604404b2eca2a1a3f4dfa2c9a3228157f69

  • SHA256

    a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d

  • SHA512

    058e74412186226b769222a1305b06cfdff4dccb88437a95cdac3f5552f4c38683dde53fd688fdd61bd3a2a03815e674101638c5e9a7d3b2ccede8dc3f0790ca

  • SSDEEP

    3072:9/7uDphYHceXVhca+fMHLtyeGxcl8/dgL6YsFmDJEFB6cn4p55wY5p1VEq:57uDphYHceXVhca+fMHLty/xcl8/dg6A

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://oceanbm.ca/hpplo/555555555.png

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a78464304bd66a092259d608d8505ccdd59c12ec40b7f8aac7f68fc33d07b00d.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2912

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

    Filesize

    1KB

    MD5

    f130b2d03fa713c1b7b3b743407c6108

    SHA1

    ddc3812ec29aded57cba6a6e694c25707b3533dc

    SHA256

    1a9be2dfb6d419076ac76b323d268028dbf2f5d7ee15d2695eb2def9e21d9812

    SHA512

    44cd5968968f0e58193beacc0c9521801a908cfb8f7eac2ff87620b344aa63c8eba362cf668e85e392cda27c17882477dffb61d8fecd69940be2ad4bed48c436

  • memory/2912-18-0x00007FF977E30000-0x00007FF977E40000-memory.dmp

    Filesize

    64KB

  • memory/2912-14-0x00007FF977E30000-0x00007FF977E40000-memory.dmp

    Filesize

    64KB

  • memory/2912-2-0x00007FF979FF0000-0x00007FF97A000000-memory.dmp

    Filesize

    64KB

  • memory/2912-4-0x00007FF979FF0000-0x00007FF97A000000-memory.dmp

    Filesize

    64KB

  • memory/2912-10-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-12-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-11-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-17-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-0-0x00007FF979FF0000-0x00007FF97A000000-memory.dmp

    Filesize

    64KB

  • memory/2912-13-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-3-0x00007FF979FF0000-0x00007FF97A000000-memory.dmp

    Filesize

    64KB

  • memory/2912-16-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-15-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-9-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-8-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-7-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-6-0x00007FF979FF0000-0x00007FF97A000000-memory.dmp

    Filesize

    64KB

  • memory/2912-5-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-37-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-38-0x00007FF9BA00D000-0x00007FF9BA00E000-memory.dmp

    Filesize

    4KB

  • memory/2912-39-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-40-0x00007FF9B9F70000-0x00007FF9BA165000-memory.dmp

    Filesize

    2.0MB

  • memory/2912-1-0x00007FF9BA00D000-0x00007FF9BA00E000-memory.dmp

    Filesize

    4KB