Analysis
-
max time kernel
46s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:28
Behavioral task
behavioral1
Sample
a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea.xlsm
Resource
win10v2004-20240730-en
General
-
Target
a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea.xlsm
-
Size
92KB
-
MD5
98996f86c1c26721e20ab6645661a6b8
-
SHA1
5199ab6d7d7458f2b4be4ad15504a360a559fd0c
-
SHA256
a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea
-
SHA512
88311923fc81a67d25a0938c223422fc91c69f9c6c7a57cb5b04f40d64583f57fb49980be7b5964487f1cb452d9aa014aa3629f092dd4f22641fa872eca611af
-
SSDEEP
1536:CguZCa6S5khUIOVpL7mxB4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIeFB:CgugapkhlOVx7mxBaPjpM+d/Ms8ULav6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2052 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE 2052 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a2d3e6540011d12afc6a66d0d0d06f14135167debb7d3fa34cc3b84254b94aea.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2052
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize683B
MD56fcbd0fe089dfa001513e63bb39542b9
SHA14a0044d96bc609c5b56e6390fe27eedc4eb8c25f
SHA25657caa02e3ddb418334a22995c2872f22141dc0544485db0cb53386d5f681f3f1
SHA512e584fdbf1871ca9cab6a157053068c90c87e6e0f98ba655c5989dd5106aae891b01f13fa7e6b34cc85f6a63a7029b7b0549dcbf03a8e0d4ced22606cd9f7441f