Analysis
-
max time kernel
46s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 21:49
Behavioral task
behavioral1
Sample
b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355.xls
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355.xls
Resource
win10v2004-20250314-en
General
-
Target
b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355.xls
-
Size
1.5MB
-
MD5
b1db50fd39101a9f00f6019a41146173
-
SHA1
b99ee1661682d4095db67cf99823e4b050d3ed58
-
SHA256
b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355
-
SHA512
d7c3e3fdd158f3f4840b84b13a441c5fea90ceba712a158a10caa274567f2e7f6f46524f78dbd5c58f4dff980fb70f19f5110d09323a8d45e8ca2d2a705c12eb
-
SSDEEP
24576:x8wPiXeV+fXR++idpgv/v5/r7DtYM9tnTEVxDCY6femXHxG+RUD/YsWeD:KwPiX4kYOf8
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3020 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3020 wrote to memory of 4384 3020 EXCEL.EXE 88 PID 3020 wrote to memory of 4384 3020 EXCEL.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4384
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5dd51efa58cee5a968c53b7945a0b978b
SHA1360a3c636985405e7755598f389e7bd749489a94
SHA256a93e76a282a6d4d247065fed2a596faaf6f2cee04bd1282eb474a1d99b55b889
SHA512a4ecbf7f5cbcf0335d695d047074f0ace2fbba5e553e553ffa2a3b671c8ca8684d8ecbd613d75200c287498e441f0477ef862010d1ff8f5fb2cfcda06d8ec287