Analysis
-
max time kernel
154s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-04-2024 12:28
Static task
static1
Behavioral task
behavioral1
Sample
54562d0e5baff560a922957d0784ac6c1448b8abadbab4a7be17d7d584106e40.xlsx
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
54562d0e5baff560a922957d0784ac6c1448b8abadbab4a7be17d7d584106e40.xlsx
Resource
win10v2004-20240226-en
General
-
Target
54562d0e5baff560a922957d0784ac6c1448b8abadbab4a7be17d7d584106e40.xlsx
-
Size
35KB
-
MD5
53892cc495c4922e0a591cee5d2728eb
-
SHA1
ab500e2c8c156765e61b4fef1b21b2f48e2daa85
-
SHA256
54562d0e5baff560a922957d0784ac6c1448b8abadbab4a7be17d7d584106e40
-
SHA512
b1a132b72b363b7fd53dbf56099a3bec7c0a8a3dc74edaff24c25952f5e24396cd8739b951b1671bfc9af4dea242ed7e1fc35da877b4ac7d1235de922614e0b4
-
SSDEEP
768:CanaWfnS1RiLMt6z+IGJP+ba6KPOG63JQhKdsy5cOGnQ:08SSQESIGJP+nKPOG63JQhKrZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1348 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1348 EXCEL.EXE 1348 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE 1348 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\54562d0e5baff560a922957d0784ac6c1448b8abadbab4a7be17d7d584106e40.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1348
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1416 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:81⤵PID:4604