Analysis
-
max time kernel
144s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:35
Behavioral task
behavioral1
Sample
438f6ee73a1dfa78e0ad971962fc65500ba4b5e5d9f713c70a87ab122c08f4b3.xlsm
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
438f6ee73a1dfa78e0ad971962fc65500ba4b5e5d9f713c70a87ab122c08f4b3.xlsm
Resource
win10v2004-20240226-en
General
-
Target
438f6ee73a1dfa78e0ad971962fc65500ba4b5e5d9f713c70a87ab122c08f4b3.xlsm
-
Size
80KB
-
MD5
f25190b3faf4942f735d896a908b2655
-
SHA1
33016e5b24f8e6db4362104ed2a19dbfaacff85e
-
SHA256
438f6ee73a1dfa78e0ad971962fc65500ba4b5e5d9f713c70a87ab122c08f4b3
-
SHA512
0661cbcf360abbeb48d771e3c2f40d0e60ca4260959cd5faae24b7f0221dad1c125a9749f0dd7b8fab5652082397131e50a5667709eab0dff0402589630cd707
-
SSDEEP
1536:4t2y3qlQ1ieroi8vmn9f345y4CApSeOOGO60qI1Bs/YZrmV3tRNmep:4t2y3wQZemnh3ncYeOOQSKYtw3Uep
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 660 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 660 EXCEL.EXE 660 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE 660 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 660 wrote to memory of 3616 660 EXCEL.EXE 92 PID 660 wrote to memory of 3616 660 EXCEL.EXE 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\438f6ee73a1dfa78e0ad971962fc65500ba4b5e5d9f713c70a87ab122c08f4b3.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3616
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2616