Analysis
-
max time kernel
47s -
max time network
46s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 21:46
Behavioral task
behavioral1
Sample
9976b3031260c2135544bd6766393c35bddc087e5fdf50fdb57f071b434022fc.xlsm
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9976b3031260c2135544bd6766393c35bddc087e5fdf50fdb57f071b434022fc.xlsm
Resource
win10v2004-20240508-en
General
-
Target
9976b3031260c2135544bd6766393c35bddc087e5fdf50fdb57f071b434022fc.xlsm
-
Size
92KB
-
MD5
5af6dd0e2c1be12c38c56779d869e3de
-
SHA1
2a0a5d71f81f4ce2e7f87bb6d8b75bfb80f84d7c
-
SHA256
9976b3031260c2135544bd6766393c35bddc087e5fdf50fdb57f071b434022fc
-
SHA512
36a6266e639a8e35a8c9d953ea0b7ed1a5f60985734bdfdc35fd4f46d794a8feb0cf2f0a253fd4f5365e73dca85d19509d074645396b79ad41788251c78e2024
-
SSDEEP
1536:CguZCa6S5khUID5cTzKiFTT4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIxFr:CgugapkhlDTeTaPjpM+d/Ms8ULavLcm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2308 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2308 EXCEL.EXE 2308 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE 2308 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9976b3031260c2135544bd6766393c35bddc087e5fdf50fdb57f071b434022fc.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2308