Analysis
-
max time kernel
47s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
24/05/2024, 03:31
Behavioral task
behavioral1
Sample
8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422.xlsm
Resource
win10v2004-20240426-en
General
-
Target
8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422.xlsm
-
Size
92KB
-
MD5
bfa72dacccf8fa4fac595cbecf098d83
-
SHA1
a14288d37cded5e7ece6c7c5dc6de6141e57375b
-
SHA256
8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422
-
SHA512
318baf0ac048b9e76c5bb74ce2db3bc7e809425ba8c8745dcbbd27475b6755002311eabaf16c4ad41ef2a039bafb4f52eea6f4d4e26574d15b5f7bd58afa5b57
-
SSDEEP
1536:CguZCa6S5khUI/UXnctY04znOSjhLzVubGa/M1NIpPkUlB7583fjncFYIIJV8F0:Cgugapkhl/UstY0aPjpzVw/Ms8ULavLJ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4392 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE 4392 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8ecbc0e8b22e975ce1bf46a0a1542713c02089a3ef0ea06821cd9f474c6a2422.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4392