Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-10-2022 23:21
Behavioral task
behavioral1
Sample
EXCELntDonut_CS_obf4.xlsm
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
EXCELntDonut_CS_obf4.xlsm
-
Size
62KB
-
MD5
e0f96bc62e2a67fa8e4530048fd4be74
-
SHA1
e56123187043b7da7b41a2bddafc6ed9f24fa146
-
SHA256
772d87e9a5d1eacd88525d3d2ae6144be850a001cf4b2226cf489d8122122070
-
SHA512
71f7d7f9bdbba3c67f8b584702dc5bc018959196ae82d03622c4b368787c8925322e4bace2b660281e5d53c6234d5cfbe308fab2ad1e6e128998e6a1abe73853
-
SSDEEP
1536:WXgw6sBUmaGMHg/NgGKyvwHpsByTr0rMxWz:WXgQimaGMAeLa+0rMm
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4904 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE 4904 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\EXCELntDonut_CS_obf4.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4904