Analysis
-
max time kernel
46s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 21:12
Behavioral task
behavioral1
Sample
ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30.xlsm
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30.xlsm
Resource
win10v2004-20240802-en
General
-
Target
ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30.xlsm
-
Size
92KB
-
MD5
f56b84d200e6f3ddf6bc8cdcbb7d428c
-
SHA1
1fe08a2578fcb52d4f552412303ec239ad3e5c97
-
SHA256
ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30
-
SHA512
1d18f43f9bf5a3e957511dfd0203e8c5782178d795111369f1543c550cbef4003ab47e2c8b205e21261f8709d5dd056bb3fab13441790e63dd3c3e09450e00cf
-
SSDEEP
1536:CguZCa6S5khUIBiPxJf0gdY34znOSjhLqxMUH9Ga/M1NIpPkUlB7583fjncFYIIZ:CgugapkhlBiPP0gdY3aPjpqxvD/Ms8UA
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2732 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE 2732 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ad92e4d3685d6bc309516661c3243c8f63e543e1f47184c6e1987f7e00251e30.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2732
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5bc9ee1ef127b2f764dd6292f1ca96d5b
SHA1902dc6ed57e752ffa732ce2af635418f1d3e7b23
SHA256f00e1096b7901e0323b258c4fa068d8fe04574309ccd2e19076c8217c80268c1
SHA5120ebea05d1b40f57ff2225117eacd56acee1c8ddc1e1f8b22cea89794305dc71bbc52a9239bd11cbbd8cee6e087fe1d68419d52cdb40054fe4fd8693d8d58ea94