Analysis
-
max time kernel
101s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 18:01
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/Users/HoaWalsh/Downloads/CustomerImportTemplate (2).xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/Users/HoaWalsh/Downloads/CustomerImportTemplate (2).xlsm
Resource
win10v2004-20240426-en
General
-
Target
Device/HarddiskVolume3/Users/HoaWalsh/Downloads/CustomerImportTemplate (2).xlsm
-
Size
236KB
-
MD5
721ee6b11f003b2257c5b8966b2a8455
-
SHA1
5b523abc7b334f82026aa4198846d094ea587b21
-
SHA256
d46b14fe4f3acb2b0a83e0f9527b2d48794bf71d91889a435cdd6a1091363e84
-
SHA512
7458037af444507464ed35b62c3646d0c9df2a8c972a252f4ce7a15553bb14cf17825271b3d13393012eef341d64d29a6e934b8c21494671b17c9b4ab033398c
-
SSDEEP
6144:xIBPDRl4zXaiscnEOTnM1UdwXORYVAnMFFqL:xIBP1l+q2HbjwsYnC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2032 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 2032 EXCEL.EXE 2032 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE 2032 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Users\HoaWalsh\Downloads\CustomerImportTemplate (2).xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2032