Analysis
-
max time kernel
32s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
30-05-2024 02:33
Behavioral task
behavioral1
Sample
bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f.xls
Resource
win10v2004-20240426-en
General
-
Target
bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f.xls
-
Size
111KB
-
MD5
55c2d2ca19984dd2eabefa9b949c5c99
-
SHA1
661da176d58427e7264183a08d923d890600d4fa
-
SHA256
bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f
-
SHA512
2e6167908e09268c4b7e0e0203802e907106db56c103488f4d7c75a1b315292a06065b7f1d9cfa45ff850c6a954be78e9541999a2ba7a5aaea5d3e88487e89ce
-
SSDEEP
3072:aTxEtjPOtioVjDGUU1qfDlaGGx+cW/IEuz59V2/hdMXAfPB:ixEtjPOtioVjDGUU1qfDlavx+//IE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE 3044 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\bd0890c2025400a8c64a79b21296c614b8c0794ca49a9be5504bb3681ba9397f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3044