Analysis
-
max time kernel
196s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25/05/2022, 21:52
Behavioral task
behavioral1
Sample
?i=1sbgvjjtk.xlsm
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
?i=1sbgvjjtk.xlsm
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
?i=1sbgvjjtk.xlsm
-
Size
83KB
-
MD5
a19739c3b8b42e530b0c39885a7eb572
-
SHA1
034d7b56335bc65f1010c24801f40f739f981418
-
SHA256
689555499fd2dff9a85acca987cf63ecb004150fb9428e7336b11a90eed8a4a6
-
SHA512
30cda33c13a7c5cbee38fc74846b6263ca20efc53434577855032e59f1e4376675d9f46b804e61964713d91fe7af8f9bcd3ffe010ebeec4461e45c38ea6c7238
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/
xlm40.dropper
http://zhongmaifangwu.com/TEST777/3U4Un0u/
xlm40.dropper
http://chicagocloudgroup.com/wp-content/updraft/OKXV/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1728 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE 1728 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\_i=1sbgvjjtk.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1728