Analysis
-
max time kernel
59s -
max time network
44s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 21:43
Behavioral task
behavioral1
Sample
2d71296e807ab6bf217f2277e9d4ab238293f057e48c68e72ff97ffa76c59ed1.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
2d71296e807ab6bf217f2277e9d4ab238293f057e48c68e72ff97ffa76c59ed1.xls
Resource
win10v2004-20250314-en
General
-
Target
2d71296e807ab6bf217f2277e9d4ab238293f057e48c68e72ff97ffa76c59ed1.xls
-
Size
88KB
-
MD5
e77abb1c4c56daafdd4fe9499df7d3fa
-
SHA1
1c6d1a63048512075f03a08979f7863beffcac3a
-
SHA256
2d71296e807ab6bf217f2277e9d4ab238293f057e48c68e72ff97ffa76c59ed1
-
SHA512
1eaadbbea0caae0dfcd634dc0c676d34eef787ada0499f81ccf573aa256596cf10d67df1e7722e9120bf1484a02414cc47249f05a3475f8e3452e27bcf2a9894
-
SSDEEP
1536:8ypKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiAezwrMCtvJecvRtbYDlgtCSqK3gtFA:xKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgZ
Malware Config
Extracted
http://ilriparatutto.eu/tmp/0K1NupyKPeX/
http://cubicegg.asia/pKUVQsfSHB/cfF/
http://drviniciusterra.com.br/wp-admin/Z8T84TxcRXPi99/
https://hqsistemas.com.ar/cgi-bin/FMPTFCp/
http://jimmymerida.imd.com.bo/cgi-bin/k9Cnl0bk/
http://ceibadiseno.com.mx/brochure/hnZjHGo1EYITQZ/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2280 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2280 EXCEL.EXE 2280 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2280 EXCEL.EXE 2280 EXCEL.EXE 2280 EXCEL.EXE 2280 EXCEL.EXE 2280 EXCEL.EXE 2280 EXCEL.EXE 2280 EXCEL.EXE 2280 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2d71296e807ab6bf217f2277e9d4ab238293f057e48c68e72ff97ffa76c59ed1.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2280