Analysis
-
max time kernel
110s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
20-08-2021 04:21
Behavioral task
behavioral1
Sample
Outstanding-Debt-1570523025-05042021.xlsm
Resource
win7v20210410
Behavioral task
behavioral2
Sample
Outstanding-Debt-1570523025-05042021.xlsm
Resource
win10v20210408
General
-
Target
Outstanding-Debt-1570523025-05042021.xlsm
-
Size
114KB
-
MD5
7dd9cb1214ebc35eaa27dedb4d92d01c
-
SHA1
582ca6e064f447201874fd7701f7209099dc8f4a
-
SHA256
bdfa89a71da55bbad42a0edf3042dd4bea846a662a97fdfd376e492f3629ee96
-
SHA512
511a26fa3766dc52acb96355fc6d3782ebb967d806f02f5a4e52e969002e517934d36ad72e2cfd5fd58909d6c3fce40dc21e4534bea6e4daad118fa65586c247
Malware Config
Extracted
http://185.183.99.115/44313,6048108796.dat
http://51.89.73.159/44313,6048108796.dat
http://190.14.37.38/44313,6048108796.dat
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE 628 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Outstanding-Debt-1570523025-05042021.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:628