Analysis
-
max time kernel
113s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2024 05:52
Static task
static1
Behavioral task
behavioral1
Sample
BAKA _MC monthly call list Aug 22.xlsx
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
BAKA _MC monthly call list Aug 22.xlsx
Resource
win10v2004-20231215-en
General
-
Target
BAKA _MC monthly call list Aug 22.xlsx
-
Size
2.4MB
-
MD5
bb0b4c3b399ded09addb4ed53c78caae
-
SHA1
635f047e0a4dbc6129d09c189b6bede16d68f613
-
SHA256
7847cf6b7e61581b6a19be805cf1dbc7a4e12f82add79bf0ed707edf377f45d7
-
SHA512
d0a817c8017196b5042245cebf41fba0f71abe46999b786b6d1daa3a4d18fc4494d6aa60ddaa9e0f2f64f6baf511a221e4321cb946d551b21b89851de7da5954
-
SSDEEP
49152:Y/Hl6qCTj3Q0Ca82xbNPPkx71Sw9A4EdiGCruboWqGh6ul5d4lzcPkHH/sBDeRqL:Y/ojxCj25NXODAHYGCib4Nul5K5hHgDt
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3632 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3632 EXCEL.EXE 3632 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\BAKA _MC monthly call list Aug 22.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3632