Analysis
-
max time kernel
46s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
15/06/2024, 21:37
Behavioral task
behavioral1
Sample
420f8c95d5cdd6a6e060cb5b0f820405e625cb9d34300b62c4364eeca93d8c47.xlsm
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
420f8c95d5cdd6a6e060cb5b0f820405e625cb9d34300b62c4364eeca93d8c47.xlsm
Resource
win10v2004-20240611-en
General
-
Target
420f8c95d5cdd6a6e060cb5b0f820405e625cb9d34300b62c4364eeca93d8c47.xlsm
-
Size
92KB
-
MD5
2b96a26837c8241e01d39df3675b77d3
-
SHA1
bb3181e554cb36ec67f280ccd03e2501ed92d61d
-
SHA256
420f8c95d5cdd6a6e060cb5b0f820405e625cb9d34300b62c4364eeca93d8c47
-
SHA512
685fb3f3303425610bcb9f40fd88fa052deb1b79def6051cb61f8713d1322d337e77ff7127af4f275c7805901065ba088b62e9db61fac192c6cdb6062d17e337
-
SSDEEP
1536:CguZCa6S5khUIyAJy4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIrrkFW:CgugapkhlyA8aPjpM+d/Ms8ULavLcA
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2168 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\420f8c95d5cdd6a6e060cb5b0f820405e625cb9d34300b62c4364eeca93d8c47.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2168