Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:02
Behavioral task
behavioral1
Sample
cc3b2007c9c833e8b519d235dd0d1a31e1c951d01e25f1f529967b090a0ef719.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cc3b2007c9c833e8b519d235dd0d1a31e1c951d01e25f1f529967b090a0ef719.xlsm
Resource
win10v2004-20240730-en
General
-
Target
cc3b2007c9c833e8b519d235dd0d1a31e1c951d01e25f1f529967b090a0ef719.xlsm
-
Size
91KB
-
MD5
f5d85bbf8553630c985adb7250991091
-
SHA1
3a5c49e3c2c7c85e170862456be3f549cdb6413d
-
SHA256
cc3b2007c9c833e8b519d235dd0d1a31e1c951d01e25f1f529967b090a0ef719
-
SHA512
2b44b9625e28a9b883a739425ce0faf065cda5f7da9e51798d92ab3dde6e0578153e9a780aa10903108f8001e19681726a51887b4b8828013a606c8459c28e4a
-
SSDEEP
1536:CguZCa6S5khUIBcN0SB74znOSjhL97kGa/M1NIpPkUlB7583fjncFYIIrF9:CgugapkhlBctaPjpE/Ms8ULavLce
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1376 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE 1376 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cc3b2007c9c833e8b519d235dd0d1a31e1c951d01e25f1f529967b090a0ef719.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1376
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5cda672465d3613f61334fefe6c876810
SHA18cbd770ad6c141e00c9ebd29f13c7757ae4401d2
SHA256114b2e8f7b27b1c977e78d6868855f5459241a1e1eae7ae224179f519ec6935b
SHA5127c3efc617d563c5ae536ccf736085968565a00658a7dd15249b7bee4377abeefdea04f530897a71b01a46f9a3e34ef2cdaadee1412b40be4b078626e540ff750