Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/08/2024, 21:20
Behavioral task
behavioral1
Sample
250dbcf165dc6bc32deccb0b8daf51f78a5b34ef5267394ba8b15f13301b6e6f.xlsm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
250dbcf165dc6bc32deccb0b8daf51f78a5b34ef5267394ba8b15f13301b6e6f.xlsm
Resource
win10v2004-20240802-en
General
-
Target
250dbcf165dc6bc32deccb0b8daf51f78a5b34ef5267394ba8b15f13301b6e6f.xlsm
-
Size
91KB
-
MD5
2729ef2e8b524c50c9ad751618b2651e
-
SHA1
02f07b4dbec1eed28a77c147cd71a77e0d8e638e
-
SHA256
250dbcf165dc6bc32deccb0b8daf51f78a5b34ef5267394ba8b15f13301b6e6f
-
SHA512
d80cfa82b720d90b1ff4de4285cfa93618c7268f17c3fdc2b2436c478c39836e4e0df8e78a4a2e70ac36b642ca7db0e356186a7f98911f0499c99872335cab05
-
SSDEEP
1536:CguZCa6S5khUIT+evbvj3OvnC4znOSjhL97kGa/M1NIpPkUlB7583fjncFYII8cV:CgugapkhlT+CaqaPjpE/Ms8ULavLcP+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1872 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE 1872 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\250dbcf165dc6bc32deccb0b8daf51f78a5b34ef5267394ba8b15f13301b6e6f.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5253b9376dd01d70117865c8ebd14ee0b
SHA1ce0d6225612cfbdc86da07803026775dc855df05
SHA256b5e6c40072ac0f1e6285fd02f14194b37fc1b1766a46833872ada75e0544b16c
SHA51262b5e35f237f7b4fde3e378f1039c583d404b55b231f0f854b208b57345d7f983cc477fe90483fe7f980445c3b110dd86956b57799a48d983740748a29d22a7f