Overview
overview
7Static
static
7Book2.xlsm
windows7-x64
1Book2.xlsm
windows10-2004-x64
1GoogleClou...er.exe
windows7-x64
7GoogleClou...er.exe
windows10-2004-x64
7$PLUGINSDI...os.dll
windows7-x64
3$PLUGINSDI...os.dll
windows10-2004-x64
3$PLUGINSDIR/INetC.dll
windows7-x64
3$PLUGINSDIR/INetC.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDIR/UAC.dll
windows7-x64
3$PLUGINSDIR/UAC.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ze.dll
windows7-x64
7$PLUGINSDI...ze.dll
windows10-2004-x64
7$PLUGINSDI...nz.dll
windows7-x64
3$PLUGINSDI...nz.dll
windows10-2004-x64
3deneme.html
windows7-x64
1deneme.html
windows10-2004-x64
1photo_qual...ate.py
windows7-x64
3photo_qual...ate.py
windows10-2004-x64
3Analysis
-
max time kernel
112s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2024 01:38
Behavioral task
behavioral1
Sample
Book2.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
Book2.xlsm
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
GoogleCloudSDKInstaller.exe
Resource
win7-20240611-en
Behavioral task
behavioral4
Sample
GoogleCloudSDKInstaller.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/ExecDos.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/INetC.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/INetC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/UAC.dll
Resource
win7-20240508-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/UAC.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240704-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/nsResize.dll
Resource
win7-20240611-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/nsResize.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/nsisunz.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
deneme.html
Resource
win7-20240508-en
Behavioral task
behavioral20
Sample
deneme.html
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
photo_quality_update.py
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
photo_quality_update.py
Resource
win10v2004-20240704-en
General
-
Target
Book2.xlsm
-
Size
11KB
-
MD5
528ceaab3d384b4b02420aa401a1adaa
-
SHA1
d43204f11c660b025c3760372e39e20e7b5ff7ec
-
SHA256
58c4cb3a6d4427ceaedd0e5d30e4d1101694354d165757ceef6534536f6e63de
-
SHA512
e05ead3b1c8bb680b474d20fffe47cced8f772e7366d362bcea99228b9d45d845b22fe1e709d0a098cbd47b50393b5d952ca1898f59ced7c0b63588244d455a7
-
SSDEEP
192:m0YN4+tJBeCFPS5ysPWjraFUlbVvevUqzPANCI/8VhWR/Na4:XYN5tCCFa5O0UlM9zPAb08R/Na4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1012 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE 1012 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Book2.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1012