Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 21:48
Behavioral task
behavioral1
Sample
6acd28162b30b5bdd1b79f22f34e8d216e9b78228b29a77568be3b7653da86f1.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6acd28162b30b5bdd1b79f22f34e8d216e9b78228b29a77568be3b7653da86f1.xls
Resource
win10v2004-20240226-en
General
-
Target
6acd28162b30b5bdd1b79f22f34e8d216e9b78228b29a77568be3b7653da86f1.xls
-
Size
805KB
-
MD5
93b222bc5700805d2c25ce841edb6262
-
SHA1
820d516f02a712e2c0d9be06b3ae4121ef1d41b9
-
SHA256
6acd28162b30b5bdd1b79f22f34e8d216e9b78228b29a77568be3b7653da86f1
-
SHA512
a0df71d42df51fc1a8cc4e2ad938fc4a36b5ee4721552167081095c4ac3bc21842d24777e4a551523a0b1b1f32bf45e9305363160d0d38b61f37595350f9fe72
-
SSDEEP
6144:bEXXxDWT1iJXcmGNNcku0uPGvpHUgbudB5mO2/JZP/ci9UDpGHOCoNG8fd/fUMR6:4Xh1cGHZlhRc0Pa35
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3004 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3004 EXCEL.EXE 3004 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE 3004 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6acd28162b30b5bdd1b79f22f34e8d216e9b78228b29a77568be3b7653da86f1.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3004
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4280 --field-trial-handle=3488,i,1267426273081718772,6254127258555406296,262144 --variations-seed-version /prefetch:81⤵PID:3060