Resubmissions
15-03-2024 02:46
240315-c9qgnagg39 1015-03-2024 02:45
240315-c849esgg29 114-03-2024 17:53
240314-wgkkgsaf8s 114-03-2024 17:45
240314-wb7stsae5w 10Analysis
-
max time kernel
1373s -
max time network
1165s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 17:53
Static task
static1
Behavioral task
behavioral1
Sample
march-D9445-2024.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
march-D9445-2024.xlsx
Resource
win10v2004-20240226-en
General
-
Target
march-D9445-2024.xlsx
-
Size
60KB
-
MD5
ac89528d1040074d45d5c19a0ceb7a6a
-
SHA1
8b47dba91232a0e1ac14cee24267e9c26d7e483c
-
SHA256
1d67808fee7115fa2597e8843aa10f737298c9f097397e5de486fc762753ea0b
-
SHA512
37da11cea5188cc7b7f6c9154410d9d663d5ed306313badbaa421025c49f90bff177613a132d2bff1b529ec214d9eb034937ab8d7830d30bd4451f1579a27feb
-
SSDEEP
1536:64N5DGhJDl5eZ9l0ohOplRfzDrtw86RUtdkV:643ChJR0vl0ohYlRfzD/6o2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3256 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3256 EXCEL.EXE 3256 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\march-D9445-2024.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3256