Analysis
-
max time kernel
58s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
24/03/2025, 21:45
Behavioral task
behavioral1
Sample
f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab.xls
Resource
win10v2004-20250314-en
General
-
Target
f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab.xls
-
Size
88KB
-
MD5
ff4e8b8a29cb871a6bf568d41e532fcb
-
SHA1
2f2ca999564686642023d620a551ef80bedd1d07
-
SHA256
f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab
-
SHA512
d8f5a5e3c241a6401175c139be380814ebb02f9b86a55808103ce4b8b99e07f5faeb0ed7dc283375f5229d1003fa1d6fce04506562f106168357d3cb00c018e1
-
SSDEEP
1536:8RpKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgiAezwrMCtvJecvRtbYDlgtCS1K3gtFA:CKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgo
Malware Config
Extracted
http://ilriparatutto.eu/tmp/0K1NupyKPeX/
http://cubicegg.asia/pKUVQsfSHB/cfF/
http://drviniciusterra.com.br/wp-admin/Z8T84TxcRXPi99/
https://hqsistemas.com.ar/cgi-bin/FMPTFCp/
http://jimmymerida.imd.com.bo/cgi-bin/k9Cnl0bk/
http://ceibadiseno.com.mx/brochure/hnZjHGo1EYITQZ/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5516 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5516 EXCEL.EXE 5516 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5516 EXCEL.EXE 5516 EXCEL.EXE 5516 EXCEL.EXE 5516 EXCEL.EXE 5516 EXCEL.EXE 5516 EXCEL.EXE 5516 EXCEL.EXE 5516 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f1d960b2b20569c3e0d69c578ac6963ed1987954a415151706f5210f2cdcfcab.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD56589bafc1a3b103c412111cd7d8af2ab
SHA1d6b4bb547649d3fbd3dc173f86997371cadbd040
SHA256cbdd0d8b548a5c7ae7b3faee03d4d88983b85108073b2a689ea24f8128f697ff
SHA5120f9159012d1c3719bb16e9ce8d7b57ffea3248611a2576fb7c185d04283693b9786e0a008e4fce61976f0bec527b679387dc71002a532a2647513baf9a8ebd3b