Analysis
-
max time kernel
47s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:36
Behavioral task
behavioral1
Sample
f6dc9789019f737aefd1c1fe43ef2f5601565be6e449e900d4c971673d7a353e.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f6dc9789019f737aefd1c1fe43ef2f5601565be6e449e900d4c971673d7a353e.xlsm
Resource
win10v2004-20240730-en
General
-
Target
f6dc9789019f737aefd1c1fe43ef2f5601565be6e449e900d4c971673d7a353e.xlsm
-
Size
92KB
-
MD5
5fa27f6ad8fe2b68227e50018c0bd620
-
SHA1
55f9c0aeffaac4fac10099657ffefb68476cf0b5
-
SHA256
f6dc9789019f737aefd1c1fe43ef2f5601565be6e449e900d4c971673d7a353e
-
SHA512
46f2c0073c975cc40ed0ebf432a25466f6b6bf2e839f27ca078506900c6c4f73817e242cc1a51a955f9de62fbfdc296af1abe258403e74243118e445e161c37c
-
SSDEEP
1536:CguZCa6S5khUIeL+s6X0yBH4znOSjhLzVubGa/M1NIpPkUlB7583fjncFYIIfFV:CgugapkhlUNQaPjpzVw/Ms8ULavLc6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 212 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE 212 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f6dc9789019f737aefd1c1fe43ef2f5601565be6e449e900d4c971673d7a353e.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:212
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5024e0026f0d35f595738f496c4aa02f2
SHA134330fad52ba4f0503c592e580c838e88ebd83b5
SHA256752601331bd6c3dd27f85c5aefb34273c632538749f50aeac74989ae504e1267
SHA51226ccf6e1f5fee2bcc9663449889de39019a813c22ae86b02b1429e89160f25bcb6ff2a0a57f41ea2b2459a47109a9caf3690b971e82e33fa5db1d095208bf9c8