Analysis
-
max time kernel
160s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 08:14
Behavioral task
behavioral1
Sample
fe10eb5b8bb94261e2e6471b47d9f3de9c903d92263191013e4d4c39b76bc089.xlsm
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fe10eb5b8bb94261e2e6471b47d9f3de9c903d92263191013e4d4c39b76bc089.xlsm
Resource
win10v2004-20240226-en
General
-
Target
fe10eb5b8bb94261e2e6471b47d9f3de9c903d92263191013e4d4c39b76bc089.xlsm
-
Size
279KB
-
MD5
1ea8373cf2608e03a6d274c7452ea500
-
SHA1
e72edd8dfbd71785889ebbbbab7256ea4f4358bc
-
SHA256
fe10eb5b8bb94261e2e6471b47d9f3de9c903d92263191013e4d4c39b76bc089
-
SHA512
77b5c630c95efe2be2941ec81f5d81f80195ebf3c357a8d5d37ff7881c35eea82dcc3173c6329ed91a3b6c5dcb7861fd51ead7a1f4004a9b71bd516b0c8db556
-
SSDEEP
6144:UTOb6e4B6/zppq1ZagOcp/GtYtisaY9sPR01FTHe0zpQEuA:UTw/FpCecpfrPWixjl
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1476 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1476 EXCEL.EXE 1476 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1476 wrote to memory of 3296 1476 EXCEL.EXE 91 PID 1476 wrote to memory of 3296 1476 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\fe10eb5b8bb94261e2e6471b47d9f3de9c903d92263191013e4d4c39b76bc089.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3296
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2904