Analysis
-
max time kernel
54s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 22:03
Behavioral task
behavioral1
Sample
cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c.xlsm
Resource
win10v2004-20240802-en
General
-
Target
cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c.xlsm
-
Size
92KB
-
MD5
e8362f4eeb7876aaadc295163a620f41
-
SHA1
268a98c161b1ae1ed9ef1825914c03e7606f0933
-
SHA256
cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c
-
SHA512
32de0ef99820e15d0a59261b4a8ef6c58d086a3b7702f1d36701fde82c2bb38102839e40fe79ffa8d7e420b8df1cc7080031d87c63094377ad919ad749236550
-
SSDEEP
1536:CguZCa6S5khUINVpidxZz4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIVFc:CgugapkhlNKdDzaPjpM+d/Ms8ULavLcz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3112 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE 3112 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cdc987c410b4ca4d0f8e0036b4b3bf67d75beac26a4e70b8f08d88adfb6ccd6c.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3112
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1020,i,11708048364682646792,608099842549576907,262144 --variations-seed-version --mojo-platform-channel-handle=1420 /prefetch:81⤵PID:4980
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53d74a9dae7cd3100ca9cf525bdb5084d
SHA1bf96354561190178272f3cce58b6c313c925f87e
SHA25684fa7ebb177a0250b22b754512b9be22b94289974fed9479f1ef2a081ef9d249
SHA512b0ed081250d0872dd1dd482ab6f0745b9323fadb74494e5ccec723e5fdd3278fb15105c97a3e58267c3ff9baec98a476a329df7668a5004b4c0d2c9f039d2c01