Analysis
-
max time kernel
101s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2024, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
suspicious.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
suspicious.xlsm
Resource
win10v2004-20240704-en
General
-
Target
suspicious.xlsm
-
Size
14KB
-
MD5
2494323992614666631c6351ad185b7b
-
SHA1
894add9af3262dca1189e88aabca445dcc8a8bd1
-
SHA256
c510195543101703223aa76908dc5ba4e5d53607bc2bc73fd708eae3a2ec76d6
-
SHA512
968226bc4614a8a63bdcb9be98732cd73b8128006c18d0b02254fa14077390a8ca4dba0cffb52577ba88d4145460ce7afeb9f35874bbae38034d0d3caeee2b84
-
SSDEEP
384:oFE//V+m4R7Ix5IZXXtbYwWOjOx4dAx7r/lj:o0NrU7IEX9pyxrr/9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2500 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE 2500 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\suspicious.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD51da4d142e2d712074f85a9c6c31b38ef
SHA15fe056f1f8db8ff107ee13b04c178802bd3a1919
SHA25622b2a2b6ca2b625207f41110bba5902a04ade2137f8522efc10c4a49ae3a08ad
SHA5120a7a164edec797001294d552c9756935f5f24685656ed26199281fd50ef16ceafc4358fcd702888ba0a1908b9b9d702c2becef4c242ca7156224e8404e8011dd