Analysis

  • max time kernel
    46s
  • max time network
    40s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/03/2025, 21:49

General

  • Target

    b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355.xls

  • Size

    1.5MB

  • MD5

    b1db50fd39101a9f00f6019a41146173

  • SHA1

    b99ee1661682d4095db67cf99823e4b050d3ed58

  • SHA256

    b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355

  • SHA512

    d7c3e3fdd158f3f4840b84b13a441c5fea90ceba712a158a10caa274567f2e7f6f46524f78dbd5c58f4dff980fb70f19f5110d09323a8d45e8ca2d2a705c12eb

  • SSDEEP

    24576:x8wPiXeV+fXR++idpgv/v5/r7DtYM9tnTEVxDCY6femXHxG+RUD/YsWeD:KwPiX4kYOf8

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b643f0c70ccc5676d8d88bc0615195f40bf763701387f67b9ccc4ff37f225355.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:4384
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:824

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

        Filesize

        3KB

        MD5

        dd51efa58cee5a968c53b7945a0b978b

        SHA1

        360a3c636985405e7755598f389e7bd749489a94

        SHA256

        a93e76a282a6d4d247065fed2a596faaf6f2cee04bd1282eb474a1d99b55b889

        SHA512

        a4ecbf7f5cbcf0335d695d047074f0ace2fbba5e553e553ffa2a3b671c8ca8684d8ecbd613d75200c287498e441f0477ef862010d1ff8f5fb2cfcda06d8ec287

      • memory/3020-12-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-10-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-2-0x00007FFC57710000-0x00007FFC57720000-memory.dmp

        Filesize

        64KB

      • memory/3020-5-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-6-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-4-0x00007FFC57710000-0x00007FFC57720000-memory.dmp

        Filesize

        64KB

      • memory/3020-7-0x00007FFC57710000-0x00007FFC57720000-memory.dmp

        Filesize

        64KB

      • memory/3020-13-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-1-0x00007FFC9772D000-0x00007FFC9772E000-memory.dmp

        Filesize

        4KB

      • memory/3020-9-0x00007FFC55100000-0x00007FFC55110000-memory.dmp

        Filesize

        64KB

      • memory/3020-3-0x00007FFC57710000-0x00007FFC57720000-memory.dmp

        Filesize

        64KB

      • memory/3020-11-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-8-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-15-0x00007FFC55100000-0x00007FFC55110000-memory.dmp

        Filesize

        64KB

      • memory/3020-17-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-16-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-18-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-14-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-36-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-37-0x00007FFC9772D000-0x00007FFC9772E000-memory.dmp

        Filesize

        4KB

      • memory/3020-38-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-39-0x00007FFC97690000-0x00007FFC97885000-memory.dmp

        Filesize

        2.0MB

      • memory/3020-0-0x00007FFC57710000-0x00007FFC57720000-memory.dmp

        Filesize

        64KB