Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
49032b9f96b581f7a408a6fbb62de7e4582fcd126d1d90e23931f0b6f2c857ee.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
49032b9f96b581f7a408a6fbb62de7e4582fcd126d1d90e23931f0b6f2c857ee.xlsm
Resource
win10v2004-20240221-en
General
-
Target
49032b9f96b581f7a408a6fbb62de7e4582fcd126d1d90e23931f0b6f2c857ee.xlsm
-
Size
36KB
-
MD5
b296ef7eced5596a7f0d471efe72b1dc
-
SHA1
4db95052a3d2642747273d8dcc70577b6b5e120e
-
SHA256
49032b9f96b581f7a408a6fbb62de7e4582fcd126d1d90e23931f0b6f2c857ee
-
SHA512
421cfe4a5df00d02cf811d971e0be69579d9733f3a611b9d6f2dc7e063bba5c9bc5866069116c65eaab3383d256e0f5b51f0996b345825e01ae7605b51424a78
-
SSDEEP
768:WdWfN532HUJxukwHEtrzPGpVKnpvMFktKVNI12:WQfFxTJPGGSFktKk12
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 772 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 772 EXCEL.EXE 772 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE 772 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\49032b9f96b581f7a408a6fbb62de7e4582fcd126d1d90e23931f0b6f2c857ee.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:772