Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 04:45
Static task
static1
Behavioral task
behavioral1
Sample
ca8475a017566651cc7cdb38214f4b74.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca8475a017566651cc7cdb38214f4b74.xlsm
Resource
win10v2004-20240226-en
General
-
Target
ca8475a017566651cc7cdb38214f4b74.xlsm
-
Size
41KB
-
MD5
ca8475a017566651cc7cdb38214f4b74
-
SHA1
ac1285a24f9e653fb986089bd8a249dc70f57059
-
SHA256
b38c450392b2b32b6abce4243b75e80b451078525fd5e89ed285afb2344752bd
-
SHA512
370de0f95e8e3f5d3a4d88c2f5afb5a1a92d37dd38559d626a8c5800ef4d5f949459f787b6904f60ad691728f92a70a43495247df17461cfff6f01cc24ee7711
-
SSDEEP
768:4D6bbfxFEfoSioX5iL2PPnTMCrAuNUBsHuZLh00zKtJo0MfNADEerwRHXr5V5zUs:o6pegogLWjA8UqORzKLrcNXeQH1V5os
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3636 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE 3636 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ca8475a017566651cc7cdb38214f4b74.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3636