Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
21-05-2022 04:16
Static task
static1
Behavioral task
behavioral1
Sample
17cda44d2f0c301922ea0c89c3bf9476cf693c72dfffaf3b0d733ebcaff37b16.xlsm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
17cda44d2f0c301922ea0c89c3bf9476cf693c72dfffaf3b0d733ebcaff37b16.xlsm
Resource
win10v2004-20220414-en
General
-
Target
17cda44d2f0c301922ea0c89c3bf9476cf693c72dfffaf3b0d733ebcaff37b16.xlsm
-
Size
13KB
-
MD5
15b7f7c35176d57c7717896634ab8f1c
-
SHA1
08532ee2bdc417ea2ae0ef3b9711f8c3580df706
-
SHA256
17cda44d2f0c301922ea0c89c3bf9476cf693c72dfffaf3b0d733ebcaff37b16
-
SHA512
2b6c7067ec47edc7e88f3c6db70911314a066ec81bef8eccc2fa83053fabc53c62fbeb5b34f238983249c87ae45c95da674310a065ac019e29005004e989d363
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
Processes:
description flow ioc HTTP User-Agent header 26 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 29 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
EXCEL.EXEpid process 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE 4044 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\17cda44d2f0c301922ea0c89c3bf9476cf693c72dfffaf3b0d733ebcaff37b16.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4044-130-0x00007FFD89370000-0x00007FFD89380000-memory.dmpFilesize
64KB
-
memory/4044-131-0x00007FFD89370000-0x00007FFD89380000-memory.dmpFilesize
64KB
-
memory/4044-132-0x00007FFD89370000-0x00007FFD89380000-memory.dmpFilesize
64KB
-
memory/4044-133-0x00007FFD89370000-0x00007FFD89380000-memory.dmpFilesize
64KB
-
memory/4044-134-0x00007FFD89370000-0x00007FFD89380000-memory.dmpFilesize
64KB
-
memory/4044-135-0x00007FFD86CE0000-0x00007FFD86CF0000-memory.dmpFilesize
64KB
-
memory/4044-136-0x00007FFD86CE0000-0x00007FFD86CF0000-memory.dmpFilesize
64KB