Analysis
-
max time kernel
47s -
max time network
40s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 21:20
Behavioral task
behavioral1
Sample
992e18ee964309859c10f18a4fe1bf76bf19347ae1a18964d7de9035604c7f4c.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
992e18ee964309859c10f18a4fe1bf76bf19347ae1a18964d7de9035604c7f4c.xlsm
Resource
win10v2004-20240802-en
General
-
Target
992e18ee964309859c10f18a4fe1bf76bf19347ae1a18964d7de9035604c7f4c.xlsm
-
Size
92KB
-
MD5
60a2300473b6fc44e6c424e80b3d99f5
-
SHA1
b4bd7456104e448db3a3713b206680d77b1e5597
-
SHA256
992e18ee964309859c10f18a4fe1bf76bf19347ae1a18964d7de9035604c7f4c
-
SHA512
f269625d1328f3f7b3e379ff80abbfe1bec7a5735c9f65f09d18580e227766b81fa1f98400f84c2713d4bc44d70feaf6b8df19f47608ce9f024f00160d4c9513
-
SSDEEP
1536:CguZCa6S5khUIKdfbflV4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIvdFN:CgugapkhlK1fDaPjpM+d/Ms8ULavLc0J
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4108 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\992e18ee964309859c10f18a4fe1bf76bf19347ae1a18964d7de9035604c7f4c.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4108
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5f4352ef6f8c097a1eba95eafc6f4aa25
SHA119805f9587b8e22964a4459075f4f21c3d79ff96
SHA25658399f88a4508c4bd69be8263b5a9cea9a3be9027babdbf19675ac6a76dc32c7
SHA51286f4a4869b0131990c2b9bfa4e24aebf5027e52dbc68f69136a3339dfecbe8375bb3fa1f858d08b44909ccd58613814749ff38bfbfec5651bc84fc538b706dcf