Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01/08/2024, 21:24
Behavioral task
behavioral1
Sample
d19660c8daf486a885192e569cee7ffecb9f4e0ad0b7555a5a2d1f7e2c2ea1ae.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d19660c8daf486a885192e569cee7ffecb9f4e0ad0b7555a5a2d1f7e2c2ea1ae.xlsm
Resource
win10v2004-20240730-en
General
-
Target
d19660c8daf486a885192e569cee7ffecb9f4e0ad0b7555a5a2d1f7e2c2ea1ae.xlsm
-
Size
92KB
-
MD5
3eb8819be12ccd836dcd56d054b3c38e
-
SHA1
54aa65c1b52c9f9dd483b57aa3b666084a8b677c
-
SHA256
d19660c8daf486a885192e569cee7ffecb9f4e0ad0b7555a5a2d1f7e2c2ea1ae
-
SHA512
00ed1ed7581ec00eea94e99fc5dab06b69b79b6bce99465ced970222e3041d6a7077b96049233de521a107a64f69dc2ded26fe8d0699ea36479cefb101b39ee3
-
SSDEEP
1536:CguZCa6S5khUIjyWzH2Lri44znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIj+Fm:CgugapkhljDyW4aPjpM+d/Ms8ULavLcm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4436 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE 4436 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d19660c8daf486a885192e569cee7ffecb9f4e0ad0b7555a5a2d1f7e2c2ea1ae.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4436
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53d570f4a5256103a700c18575702e406
SHA10e0202cb7e11e9e7a3a43b35660bb9c29bd3f2f1
SHA2567ee87e1c8261f8007a1ed5d353ce2ef357086e458c489b6da5e45336437b1419
SHA5127a66c1200d18b625b327fd1b739ce2579975bf82a8253204bebadf105a967c23ced95c02cf3725353c0e3ad8714bb87f3c6e38b483fe4794485f395e4907db4b