Analysis
-
max time kernel
133s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
03/04/2025, 07:24
Behavioral task
behavioral1
Sample
302e985ae78c7fd3aec6eb243c0e4846.xls
Resource
win10v2004-20250314-en
General
-
Target
302e985ae78c7fd3aec6eb243c0e4846.xls
-
Size
274KB
-
MD5
302e985ae78c7fd3aec6eb243c0e4846
-
SHA1
d250c54304ea67f96f671fb3b82d5d77bddde46f
-
SHA256
54f0097e581dba018ed5767275f0b885ad0e84e363746f56d4dbdb3a71c3ad9a
-
SHA512
030a85fdf846530859944b0acdd0169b5fe5479165411f5f384fa673ebf72c43fadb3730fff0d91b3bc6cbcaac703a6dbdb02e953f18cb6983d57aa47b90f421
-
SSDEEP
6144:+VUpjDqF+wRj/eA05iVPey76tUnW5wg36NaFU/MbTC9xaXzkaEspKuqEsa1cggGd:Ncm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3524 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3524 EXCEL.EXE 3524 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE 3524 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\302e985ae78c7fd3aec6eb243c0e4846.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD56659d44c4d8e7331568c5009989eb56d
SHA1608c9a8286ca4cfd5e06f171c6921c20e8d26e71
SHA25662403f6536fa5ec98aa9f284f6666573f73b398bd8267958cbf1a9cd4206d17e
SHA512ef6086f16cc6f6607e568986df90a315db73162ba60693efedf4612cd3ececa5a302b8981b330c7d43dc93e201abb95caafd932606bd706052d07731652d970f