Analysis
-
max time kernel
100s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22/08/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
02446 from Imagine Presentations Ltd.xlsx
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
02446 from Imagine Presentations Ltd.xlsx
Resource
win10v2004-20240802-en
General
-
Target
02446 from Imagine Presentations Ltd.xlsx
-
Size
258KB
-
MD5
86854f1151056c9d166b69f93b9f4dfc
-
SHA1
7b2a8d436942a82b928a8c519103a5c5c1d969a0
-
SHA256
46aecfafbc45676b47803cbb3e61f8c26f9cd8c05cf20827ea7d3699cc109e07
-
SHA512
ee85ca6e45997ec0eb69c2898727858aae43d4e2ef884a7d18089fb19219ed63899d983e286722a4fb6ca561b622c895ca8fdcd562c7ffce06313af689617863
-
SSDEEP
6144:3Updv9B6hEeZECENh0f8m+eX7V3abZN3wNxI118Ze:3UfD6hiCq0Uw53eN3ig1Z
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 368 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\02446 from Imagine Presentations Ltd.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:368