Analysis
-
max time kernel
133s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2025, 07:49
Behavioral task
behavioral1
Sample
b572904170d65cbc42c52db9cd9682f2e0bad8b712a4bc0a863e963fbeb3d83a.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b572904170d65cbc42c52db9cd9682f2e0bad8b712a4bc0a863e963fbeb3d83a.xls
Resource
win10v2004-20250314-en
General
-
Target
b572904170d65cbc42c52db9cd9682f2e0bad8b712a4bc0a863e963fbeb3d83a.xls
-
Size
329KB
-
MD5
3befec8adcd72998498d07a36a700bca
-
SHA1
290a0200331b118a694b6d6d90b24ee3fad9a8d7
-
SHA256
b572904170d65cbc42c52db9cd9682f2e0bad8b712a4bc0a863e963fbeb3d83a
-
SHA512
f32ee9d1e66a624807d13074522066cad89e92fe13703556f977fc9feb8519bd6010df0f595d98f56f08baf06c6e6522d95b095a3d8a2b8c3026aa6586700432
-
SSDEEP
6144:JcKoSsxzNDZLDZjlbR868O8KlVH3dUhq7uDphYHceXVhca+fMHLty/xcl8/dgfrV:US7A8RX8IJW3javzZogE
Malware Config
Extracted
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4368 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE 4368 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b572904170d65cbc42c52db9cd9682f2e0bad8b712a4bc0a863e963fbeb3d83a.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD51aca85404c11085afbcac3c69e822978
SHA1f03d72442684b2aab356adb7af3e28da0f192fd0
SHA256e7ea938e7776daaaadc3db98668f41b4d8760c96c2b5298373f427102ace25bc
SHA512fad7f5ef2c03cad83f1bbd605521e66a7009f7a1f2da1fcf09750bb4673c579fe10d0a035fe6c7b96e7ca5f9d022d5f61f20481bf8b9ded26651e3ce4f14e4ec