Analysis
-
max time kernel
154s -
max time network
180s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 07:05
Static task
static1
Behavioral task
behavioral1
Sample
2caf623a3473d8bc40514bb9608df936.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2caf623a3473d8bc40514bb9608df936.exe
Resource
win10v2004-20231215-en
General
-
Target
2caf623a3473d8bc40514bb9608df936.exe
-
Size
306KB
-
MD5
2caf623a3473d8bc40514bb9608df936
-
SHA1
1a8f69b217f5a64b96e3f64db1d133407b4dd39f
-
SHA256
ffac3ab646de0d62b7e769c4b5f2eae38c673f2c028895a7da744ddda0611078
-
SHA512
c0882b18b65f7b069cbce58ffa4f97af56fd885c3b8b910f6459243273fba9923573a878edc6e4b40fb0a10d9c391617517df3040ca5a5df781b71c86bf50889
-
SSDEEP
6144:8vRMaZOTDio+vL/h2jzlMlI39izNPQt8IRVCACcab5O0+L81mxOH5S:+MIOTMTh2NMlI39ixPQ/RVNab5O0pmxr
Malware Config
Signatures
-
resource behavioral2/files/0x000600000002321d-47.dat -
Executes dropped EXE 1 IoCs
pid Process 4164 2caf623a3473d8bc40514bb9608df936.exe -
Loads dropped DLL 2 IoCs
pid Process 2744 2caf623a3473d8bc40514bb9608df936.exe 4164 2caf623a3473d8bc40514bb9608df936.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5084 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2744 2caf623a3473d8bc40514bb9608df936.exe 4164 2caf623a3473d8bc40514bb9608df936.exe 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 5084 EXCEL.EXE 4232 2caf623a3473d8bc40514bb9608df936.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2744 wrote to memory of 4164 2744 2caf623a3473d8bc40514bb9608df936.exe 90 PID 2744 wrote to memory of 4164 2744 2caf623a3473d8bc40514bb9608df936.exe 90 PID 2744 wrote to memory of 4164 2744 2caf623a3473d8bc40514bb9608df936.exe 90 PID 4164 wrote to memory of 4232 4164 2caf623a3473d8bc40514bb9608df936.exe 100 PID 4164 wrote to memory of 4232 4164 2caf623a3473d8bc40514bb9608df936.exe 100 PID 4164 wrote to memory of 4232 4164 2caf623a3473d8bc40514bb9608df936.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe"C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\2caf623a3473d8bc40514bb9608df936.exe"C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\2caf623a3473d8bc40514bb9608df936.exe" cmd/CallFromZipBase /C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe /65536 /108928 /220645 /313675 /C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\ /0 /8992 /0 /2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe"C:\Users\Admin\AppData\Local\Temp\2caf623a3473d8bc40514bb9608df936.exe" cmd/del /C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\ /0 /0 /3⤵
- Suspicious use of SetWindowsHookEx
PID:4232
-
-
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD50503017284ff2b935a4ee3d7ba8d53eb
SHA1260f5195077dee4fd243d6e08b8b42c9fa4ffe31
SHA256df6f06bbdc39a94d9cfdbbb12d4638c1a9d2d1d51d724039dfdcb2299b8c1000
SHA512a0ad76a6a517f3dbbe72f715a3f4b831536348785cb4b33644f2daf1088b26612971764f5da01f47cd714f032d991bc33e2e36239225349f1a5dbb14333da948
-
C:\Users\Admin\AppData\Local\Temp\XLtoEXE240102121001_tmp\XLtoEXEtmp\5 Star Personal Budget Workbook.xlsm
Filesize107KB
MD5e9d8de5a0c20ca5390a3837c579211e1
SHA17cbc609b5c458dabd61e2ad250b2c5a119a00f99
SHA2567365ce8c5b62bdd158cca7a0a8bf84e36a55d01af26483422f55f48ccd45a52f
SHA5128453c86bb48271796253ce9f2997ad040b10dfbcb10ab1856a4d0d22b6edb9cee5602ba41c534488350437f555cd47d1e728980aa57a091239b29ad1c83bac39
-
Filesize
72KB
MD54efaa53c545f4ffb1ee0ed1709c15ea7
SHA1076b2d31e24fe8cfb56f9c292fd6ca1402be79b2
SHA25621582b3a68e8753322a1b1c7e550ae7fd305de4935de68fbde9f87570f484d00
SHA5127fa8c0954729ea14fdceb788393c3de6e139fc4c480b84183863f62afacec2d6bbc0993b601a4a74c87bc89338b627dc37a18be309d090bae880ea10ab9d7314