Analysis
-
max time kernel
47s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
20/07/2024, 21:38
Behavioral task
behavioral1
Sample
74c689f4586f04ff950c7930d24a719cbf657818cfc6c2442decacd48017ccc0.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74c689f4586f04ff950c7930d24a719cbf657818cfc6c2442decacd48017ccc0.xlsm
Resource
win10v2004-20240709-en
General
-
Target
74c689f4586f04ff950c7930d24a719cbf657818cfc6c2442decacd48017ccc0.xlsm
-
Size
92KB
-
MD5
a53b121e466714dbea36df24c5c02a9e
-
SHA1
c9df6dc9970e6be826875c8253ca40f51b248912
-
SHA256
74c689f4586f04ff950c7930d24a719cbf657818cfc6c2442decacd48017ccc0
-
SHA512
8578faafed35da5591a538cae0953c9b1794eeb1fdb6f9f269d2fa11be06b7c731166e481e55edd0cf8ea7db0a50349942b9e3eb7f514481a14d637a13fe650e
-
SSDEEP
1536:CguZCa6S5khUIsZD5Qj9G32icZa4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIID:CgugapkhluDGhG32icEaPjpM+d/Ms8U4
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3464 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE 3464 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\74c689f4586f04ff950c7930d24a719cbf657818cfc6c2442decacd48017ccc0.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD538b4802a1fd8fed3c3aa3a64f7e9a21f
SHA1b748234f1b9d362542b9047e075f051916f42e7b
SHA256e445aa5b861319a84dc690164a1664fc9bd04ca0f0f57456f2062b1c39ba0116
SHA5127ace4d696fa5f2fa11f77433775bcbcce994befc7ed2a13b59df469e120664eb25075e4255bc082525dc6550ba91ecc5db314dcbd22a10d553fe1257f9f0efcd