Analysis

  • max time kernel
    159s
  • max time network
    288s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250619-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250619-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/07/2025, 12:06

General

  • Target

    ExamplesJennifer/Enjoyed.xls

  • Size

    85KB

  • MD5

    d429c47f0cc10ad4611eca4e3af6b175

  • SHA1

    87464cd046524092d076cd8493a87e6ef437164e

  • SHA256

    30167494f93fe884630f33d0db988794f24bf7cd1e4677f6b98da99c7fcbe4c5

  • SHA512

    4e2c6ce9a3b1ca703874cfba03c74344fc936773a6333cc6b786db828541b3e46b28fedf84591562ab14150587eaa1542b43c41ff45960e8c584d736e2f9b0f0

  • SSDEEP

    1536:aWk8z5i/Cn3iTvAp6bRjBz8Ui3ug54wlNvOi8O9qFxgyAzk:d1z0aSD7BBz8H3n54C52E1g

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ExamplesJennifer\Enjoyed.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2612

Network

        MITRE ATT&CK Enterprise v16

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms

          Filesize

          2KB

          MD5

          5001940ac5022c8abe99bc68bc8841a1

          SHA1

          df4f78d1e3db20803cd6f781e7be64288806c967

          SHA256

          9b1eea31f2416da178b428d6d164d396c208c2a80ccd7c26b1d531c2abcf8a22

          SHA512

          25755af2593aad0b3bc1f3838c52b155eaa7b9cab220be3f6ae66a4a2cc8104266a25d9c36e317864436cb8b4acd25a03b73a822542d16dba8f42f79be0fa6a8

        • memory/2612-10-0x00007FFEECAC0000-0x00007FFEECAD0000-memory.dmp

          Filesize

          64KB

        • memory/2612-11-0x00007FFEECAC0000-0x00007FFEECAD0000-memory.dmp

          Filesize

          64KB

        • memory/2612-1-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-2-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-3-0x00007FFF2F12D000-0x00007FFF2F12E000-memory.dmp

          Filesize

          4KB

        • memory/2612-8-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-7-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-6-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-5-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-9-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-0-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-21-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-4-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-49-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-47-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-50-0x00007FFF2F090000-0x00007FFF2F285000-memory.dmp

          Filesize

          2.0MB

        • memory/2612-48-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-46-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB

        • memory/2612-45-0x00007FFEEF110000-0x00007FFEEF120000-memory.dmp

          Filesize

          64KB