Analysis
-
max time kernel
185s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 16:27
Behavioral task
behavioral1
Sample
?i=1fszonzig.xlsm
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
?i=1fszonzig.xlsm
Resource
win10v2004-20220414-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
?i=1fszonzig.xlsm
-
Size
50KB
-
MD5
793c5a832ea9b3c4a225bc96b4449bc2
-
SHA1
168afc78144b659b18b606a26c3e9a6343dd104a
-
SHA256
894658b992050ab6d7ee061f083a48264ce56c1b4fbc5ac87c142765405a47f7
-
SHA512
df041addb6c8113b2add5439f8ce258016233a47a13a3d540187872e4ac25fe3ac87b016bb391a703e0cb73189f1720c0e723b6df47ef971238312ed77a9b607
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
http://harleyqueretaro.com/renew2019/Back2016-12-22/cv/data/RjuiFMp4Fsp/
xlm40.dropper
http://hoatuoiso1.com/replace/fVea/
xlm40.dropper
https://rumkeke.com/wp-admin/A8/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3692 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE 3692 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\_i=1fszonzig.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3692