Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
49dda908c094985983b3ce19b10a6fdb4adfe652c9783e00c3155073b093c4f6.xlsm
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
49dda908c094985983b3ce19b10a6fdb4adfe652c9783e00c3155073b093c4f6.xlsm
Resource
win10v2004-20240226-en
General
-
Target
49dda908c094985983b3ce19b10a6fdb4adfe652c9783e00c3155073b093c4f6.xlsm
-
Size
1.1MB
-
MD5
a60b1f078e4c28fc90e4f51430a819dd
-
SHA1
af6df04fab565311f46d78a5970b62afc570dbc6
-
SHA256
49dda908c094985983b3ce19b10a6fdb4adfe652c9783e00c3155073b093c4f6
-
SHA512
9808fdb3fe1fcb15f2d8a76f4ce11c17e70baf24b706b537ae2d5f340746a366155966bdaae04da9832c0b52700c8455c18e33182c73124a8ac21cb138ddb2ae
-
SSDEEP
24576:nNJB6edjJ2J0Hvan9pF36Px+K6usc655LaUnsf5kLpNnr:nPMeZJ2JuvRZ+K68aLGfGpNnr
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 372 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 372 EXCEL.EXE 372 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE 372 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\49dda908c094985983b3ce19b10a6fdb4adfe652c9783e00c3155073b093c4f6.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:372