Analysis
-
max time kernel
46s -
max time network
38s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:30
Behavioral task
behavioral1
Sample
2fb0e1858357a921b626349cdd346cd0d55885909b35d65736190a336c3dee03.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2fb0e1858357a921b626349cdd346cd0d55885909b35d65736190a336c3dee03.xlsm
Resource
win10v2004-20240730-en
General
-
Target
2fb0e1858357a921b626349cdd346cd0d55885909b35d65736190a336c3dee03.xlsm
-
Size
92KB
-
MD5
bde8bb396ba92d18f413e024075c94f4
-
SHA1
138d5bdafe6102e1ec4ab9f5c46e07a8b19c41cb
-
SHA256
2fb0e1858357a921b626349cdd346cd0d55885909b35d65736190a336c3dee03
-
SHA512
41d60cd2449d69e777d580ce17cbe0fbf2b569c5b463edfca16ac40706f75e34fad02c324068f89e5448766f65c784c795fb5a6161d8f740ad9ad04d346d7ca8
-
SSDEEP
1536:CguZCa6S5khUIkNVc4n4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYII4gFw:CgugapkhlkNVc4naPjpM+d/Ms8ULavL6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1500 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2fb0e1858357a921b626349cdd346cd0d55885909b35d65736190a336c3dee03.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5509c6a3e9f5cf9ef9cd8be387642c63d
SHA1d5501704f37c9917ba93be0946817c5511f0398f
SHA2569881e88f0ed250c51e8b146f9db50a9675d924e9cc816213459f01eb97dbb479
SHA512cfa96aae532df3623c13ccd6f64288b43d372271a8bcb98f21c9419ac548efb4c6a03858b9e061815fb8a82a24d2b7d9d5c954693d1b0429d884356015b852a2