Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 01:36
Static task
static1
Behavioral task
behavioral1
Sample
c75a3d486e3cb5a51e8aae2cd0e36b07.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c75a3d486e3cb5a51e8aae2cd0e36b07.xlsm
Resource
win10v2004-20240226-en
General
-
Target
c75a3d486e3cb5a51e8aae2cd0e36b07.xlsm
-
Size
41KB
-
MD5
c75a3d486e3cb5a51e8aae2cd0e36b07
-
SHA1
246c8f6dc25eea1a57f486ca270e0e785b7becb0
-
SHA256
d4a600c6423b3d4f96004cb8614bedce1bd8810023eda01bef2f17376c08d737
-
SHA512
e504d65ea7d9c802dac74bf7d5c5d5d6f0ac2e5e44567e3daeb94751ff219d4995e57bfe46fb7b4f21905dda547a31c8ac9f728cfe1107cdde01fb9c69498205
-
SSDEEP
768:H6ObfxCjtvB2mZBauHeg2Z++6O+Tc2DTEQS6oHxMXWWZzxdcso70uSdPW:H6UAVB5aup2ZtdHrQSA7cX70u2O
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3232 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3232 EXCEL.EXE 3232 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE 3232 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c75a3d486e3cb5a51e8aae2cd0e36b07.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3232
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4072 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:1628