Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98.xlsm
Resource
win10v2004-20240226-en
General
-
Target
70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98.xlsm
-
Size
350KB
-
MD5
c1f47a14a958e2345ba929afa829c7e7
-
SHA1
4e30b187cdd04d385854b5aa5b06999c76b84049
-
SHA256
70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98
-
SHA512
46c7fb99ca38685d9031a7420dc2a101a68e4f3c23a2ec0ea130044bcac11435007c9b3d5de58e41d6feb82e6410f855b28777cb97e33190ed76eb6ae88d13a7
-
SSDEEP
6144:qS6QagdFCmzIDv5yZV7HywNWeB6vGGGol25gj//v/OsQVjuiOzqGVo2DKYm+YP:qIPCOIDv8fyLOgGGdF/n90yfGGG2DKJ3
Malware Config
Extracted
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 232 output.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3632 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE 3632 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 232 3632 EXCEL.EXE 89 PID 3632 wrote to memory of 232 3632 EXCEL.EXE 89 PID 3632 wrote to memory of 232 3632 EXCEL.EXE 89
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\70038dc836f537dea842699af7d86efb201ec5198e46c536c981fd5eb8430e98.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Public\output.exeC:\Users\Public\output.exe2⤵
- Executes dropped EXE
PID:232
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
362KB
MD586926e56e4f6d854161066b5989a350e
SHA1ca3209a05fb91ebd01989f1fb3afbba9b4e209ac
SHA256f9ff42037f02b6a2eedf7a6fb7aedb4b5d1f0eb460069f4e923fb60b5ad0841a
SHA5122c265ebe599130827dc1c47c4ac13e618eebc08cca99b7e83463fe85b000a4bca24b1b5e934d34c24d6ed024c6258ffd0e99f0f2ab636b69b3a32e60267fbad2