Analysis
-
max time kernel
46s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
10-07-2024 21:12
Behavioral task
behavioral1
Sample
154ba9198147b5932f383e8b25f8fdc3cd73a3cc823b53d8860530d446dfaaca.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
154ba9198147b5932f383e8b25f8fdc3cd73a3cc823b53d8860530d446dfaaca.xlsm
Resource
win10v2004-20240704-en
General
-
Target
154ba9198147b5932f383e8b25f8fdc3cd73a3cc823b53d8860530d446dfaaca.xlsm
-
Size
91KB
-
MD5
34a6c1cdd88780f5c0889172c876b319
-
SHA1
c479d3fde69c3139e60eba94d7578d6ad72460a1
-
SHA256
154ba9198147b5932f383e8b25f8fdc3cd73a3cc823b53d8860530d446dfaaca
-
SHA512
fea21badb06f6d18b69d6ed87a5c98aed32067d845a24c4cffda571adb9a6991d9f597b3db3fd236097c5e7397e093fd46f473c93f5c3f7f95af9d51638e8f54
-
SSDEEP
1536:CguZCa6S5khUIRMCoD4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIyF3:CgugapkhlRMBaPjpM+d/Ms8ULavLcZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1448 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\154ba9198147b5932f383e8b25f8fdc3cd73a3cc823b53d8860530d446dfaaca.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1448
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD528faf7bc98b5397c68be7c824f34c434
SHA16cccb4dd9d986f586352497e2746f950fbb5b80f
SHA256052e491e497173c21a48560b12f6d296233a9a24917a61b5372d9b5c8bef9197
SHA512628bcf5345fa7fb402e99bfa63897136cb3aea6548757724e555c18df61b6dbad12f8bd5d181dab0829d90b10bf99befc4e785862ecf0f7cd4e2f84eaf6f577f