Analysis
-
max time kernel
145s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
22-05-2022 05:29
Behavioral task
behavioral1
Sample
?i=1paolhvhh.xlsm
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
?i=1paolhvhh.xlsm
Resource
win10v2004-20220414-en
General
-
Target
?i=1paolhvhh.xlsm
-
Size
50KB
-
MD5
793c5a832ea9b3c4a225bc96b4449bc2
-
SHA1
168afc78144b659b18b606a26c3e9a6343dd104a
-
SHA256
894658b992050ab6d7ee061f083a48264ce56c1b4fbc5ac87c142765405a47f7
-
SHA512
df041addb6c8113b2add5439f8ce258016233a47a13a3d540187872e4ac25fe3ac87b016bb391a703e0cb73189f1720c0e723b6df47ef971238312ed77a9b607
Malware Config
Extracted
http://harleyqueretaro.com/renew2019/Back2016-12-22/cv/data/RjuiFMp4Fsp/
http://hoatuoiso1.com/replace/fVea/
https://rumkeke.com/wp-admin/A8/
https://www.restaurantgaig.com/wp-includes/HLDoANj/
http://www.grandfurniture.com/thegrandbrands/eGd55tEm9qkPNOhViP/
http://www.hiway91.com/wp-content/Y/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3020 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE 3020 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\_i=1paolhvhh.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3020