Analysis
-
max time kernel
45s -
max time network
42s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-08-2024 21:26
Behavioral task
behavioral1
Sample
a13e2c694851c574a9f5c840c2da8ec836b372d10d220e8df53e63f5963c63b3.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a13e2c694851c574a9f5c840c2da8ec836b372d10d220e8df53e63f5963c63b3.xlsm
Resource
win10v2004-20240802-en
General
-
Target
a13e2c694851c574a9f5c840c2da8ec836b372d10d220e8df53e63f5963c63b3.xlsm
-
Size
92KB
-
MD5
ce87e0eb7b93f8348ca401910944b7ad
-
SHA1
69b8886627aa551ce102d053ea6c47aad0969ba3
-
SHA256
a13e2c694851c574a9f5c840c2da8ec836b372d10d220e8df53e63f5963c63b3
-
SHA512
f18f79e9eae0efd346a8406ea76924fb6470ec24e074361ea2e84c872788468d2425d967187950245c92af57ff3070f5036d3c639010eba5fd69c12d75910c7c
-
SSDEEP
1536:CguZCa6S5khUI5mjSqtoijtAh0m6IoV7KGa/M1NIpPkUlB7583fjncFYIIZFc:Cgugapkhl5mj9oiqi13V7E/Ms8ULavLk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4264 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE 4264 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a13e2c694851c574a9f5c840c2da8ec836b372d10d220e8df53e63f5963c63b3.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5e66fd029640b952e5d1d1ffef251352f
SHA1221a2b0889aa88c55fdb8462e80bc46cc4edac8e
SHA2562ca47831b4f55628509e812befbfdc24222ecb642e53ba2c246e29db7232840d
SHA51265417c0325b8ea7ebb4d79335646f3ab33fd1799878ceac48a64000aab3f38a856cf533369d1504a5beb785f00c5677a99359e688c32f59769857fc7b03d9659