Analysis
-
max time kernel
138s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 08:47
Static task
static1
Behavioral task
behavioral1
Sample
45ccc78404848ab22784e17a13d4db95.xlsm
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
45ccc78404848ab22784e17a13d4db95.xlsm
Resource
win10v2004-20231222-en
General
-
Target
45ccc78404848ab22784e17a13d4db95.xlsm
-
Size
41KB
-
MD5
45ccc78404848ab22784e17a13d4db95
-
SHA1
384f343a3051298c1c4275291e31f763f80c53f2
-
SHA256
44ffef0c4555fc8067d797dffce617d45c29937ba77c37500f0dee3505cc5bcf
-
SHA512
1aac6d7b341241cadda51c03ca75469ed571dc2ac7c5d29160a8fc448fb9f30dfa4acd55706c5afb4b56c5b0228ef2c56b2eaaa81bd3a9883031b8d57d6f4750
-
SSDEEP
768:C76Nbfxzosa5mSj/F5s/Ba9w+nOUFUGrK92qP8phh+kMCjkkfCxlDur:q6HEsa5mKs5a9wyyPMdPDMCokil4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1488 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE 1488 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\45ccc78404848ab22784e17a13d4db95.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1488