Analysis
-
max time kernel
46s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20240730-en -
resource tags
arch:x64arch:x86image:win10v2004-20240730-enlocale:en-usos:windows10-2004-x64system -
submitted
01-08-2024 21:05
Behavioral task
behavioral1
Sample
010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8.xlsm
Resource
win10v2004-20240730-en
General
-
Target
010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8.xlsm
-
Size
91KB
-
MD5
509857acc05ae88ee28adb2e0da66a99
-
SHA1
44cf9ef2568ec1a6b17ac3a51cfd6fd847d90014
-
SHA256
010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8
-
SHA512
37b03d09221b4f25208639662b2b2b84e3ebdb8201b098fab6be8f8a7c775453c11d82a5d68f85dbbd4223b5475b16ea0b3201677cdf9d29e126aef59463ad35
-
SSDEEP
1536:CguZCa6S5khUI5yRsKxHaH4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYII0mFg:CgugapkhlaxH2aPjpM+d/Ms8ULavLcjr
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1280 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE 1280 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\010169b502bede260c163a9f542f67afacba841bb67c94aaa230ee83d7ea6bb8.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD55e83b394a15ee9b3677387e30d80eb5c
SHA13bc5149b1de3e7b7de42eaed074bb351a466290e
SHA256e55062810075aa62219ddfb529356be922bf41a34d653057b780b93f6080b342
SHA512cbcd565fffa7ee3550c12cf4278aa152a6a315265f43caffcecfdd8ad470a894dc9a8be122308574c268d729009d826cd5d6355689a82cf93db202522121f312