Resubmissions
14-06-2024 17:57
240614-wjyvws1bla 814-06-2024 17:41
240614-v9nl6stglp 814-06-2024 17:02
240614-vj3y6sygqg 8Analysis
-
max time kernel
130s -
max time network
259s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
14-06-2024 17:41
Static task
static1
Behavioral task
behavioral1
Sample
cotizaciòn.xlam
Resource
win10-20240611-en
windows10-1703-x64
4 signatures
300 seconds
Behavioral task
behavioral2
Sample
cotizaciòn.xlam
Resource
win7-20240611-en
windows7-x64
14 signatures
300 seconds
General
-
Target
cotizaciòn.xlam
-
Size
641KB
-
MD5
2d9b5945714ea805ce5f1cf030d4433a
-
SHA1
4e4404fea5783dc087ee122528d1a54fafe986fe
-
SHA256
bcbff255ab9eb2201692467e5a33eada684a4b8c446d730a2f4820fb3c51eeb5
-
SHA512
3f378008b5c51bd149c2ce621c1e9c7478409ea253b2016edc091af0bf045ac1cacf0f3237ec0bba9f1c3cb7178419b74207d89df57fe228f8c3dc83de070c90
-
SSDEEP
12288:XrkDjbOCpOt+aSJsZTSFgF/2R2xoOfR0ieoDR2D8mSTgz4o:XrWmCpe+2Z2FgVmOfR0ip2DQgL
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4764 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cotizaciòn.xlam"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4764