Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 21:40
Behavioral task
behavioral1
Sample
c145891c80fc94cc1ef3f6a69bd6a55f7feabac353790871cd71e7d516c82c2a.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c145891c80fc94cc1ef3f6a69bd6a55f7feabac353790871cd71e7d516c82c2a.xlsm
Resource
win10v2004-20240709-en
General
-
Target
c145891c80fc94cc1ef3f6a69bd6a55f7feabac353790871cd71e7d516c82c2a.xlsm
-
Size
92KB
-
MD5
4a73161876715efdd4b5514ff495a415
-
SHA1
8af7fda12ffd2809f3be0438f3370f06ecb02dad
-
SHA256
c145891c80fc94cc1ef3f6a69bd6a55f7feabac353790871cd71e7d516c82c2a
-
SHA512
f906a1105b46ed8d208f1cdc60765de8ea83af8fd3e37c83f8959406ceb566566e0e0da95872c1a0bd2ccd3f78bffe6768c61fc31b4014710580cce61a898ef9
-
SSDEEP
1536:CguZCa6S5khUII38ODsdU4znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYIIneFf:CgugapkhlIMODIUaPjpqxvD/Ms8ULavA
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2080 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c145891c80fc94cc1ef3f6a69bd6a55f7feabac353790871cd71e7d516c82c2a.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD507c5eec4ea3da37079278fbb0ae13439
SHA173d5f2a1b5fae62d61fb08f043cc7de755ace76b
SHA2565db47d74c0412ead657a39c6763c9956a50099808ff08e54a6f5193ea7e42544
SHA512072a7b2e42818a3b535a3d001973d82d0907158ffded8c41355c536bf3d46767c3e2c662ae6866bf8a66071063c8d8679cb0071cc7ef50f3f5c885ca821c70cb