Analysis
-
max time kernel
46s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18-08-2024 21:20
Behavioral task
behavioral1
Sample
409bfe3444511b4dc977e5eab20615a63076cf179e23adb7b675333bac9a8430.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
409bfe3444511b4dc977e5eab20615a63076cf179e23adb7b675333bac9a8430.xlsm
Resource
win10v2004-20240802-en
General
-
Target
409bfe3444511b4dc977e5eab20615a63076cf179e23adb7b675333bac9a8430.xlsm
-
Size
91KB
-
MD5
07e110b1e6e88e60978bbe8b5f5dfac0
-
SHA1
70c724ecde02c18381e3cfc93577ec023687889b
-
SHA256
409bfe3444511b4dc977e5eab20615a63076cf179e23adb7b675333bac9a8430
-
SHA512
96ca0b9683deeb35e2d23f78a7c2e848774727f0cd855097c5003490066061b15262a2b93e51f1f8f500bbcb981cd4d60431b61dd7f0cacd24b8897fb10fca00
-
SSDEEP
1536:CguZCa6S5khUIXUnLfB60qT44znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIalFs:CgugapkhlXUnbBvqT4aPjpM+d/Ms8ULA
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3408 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE 3408 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\409bfe3444511b4dc977e5eab20615a63076cf179e23adb7b675333bac9a8430.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD57ad0bc6172df2503d7e7288052b113eb
SHA11052915e26a34965dc7f9a1eccbcb74866df33fd
SHA256e7791a7ddb186b618b89e4a3ae41d21c874acfceb2da44a900c189c137fa591c
SHA512085a45c45f34c741fadb8013338dcc1f8275915389315645607e72e7d66070104f9fb4797c90c74b8ef15e087f98b220cd62c982b940b3b9f39bc88587d7da63