Analysis
-
max time kernel
47s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 21:39
Behavioral task
behavioral1
Sample
242ad5c7f1838f9e531e34c56bb51e66a20acdf4b3b18ec68a4eb9969c6d332b.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
242ad5c7f1838f9e531e34c56bb51e66a20acdf4b3b18ec68a4eb9969c6d332b.xlsm
Resource
win10v2004-20240802-en
General
-
Target
242ad5c7f1838f9e531e34c56bb51e66a20acdf4b3b18ec68a4eb9969c6d332b.xlsm
-
Size
92KB
-
MD5
69fd6174fb56e3e085809a8a57ae28ea
-
SHA1
761695b3db5483d42c305ea67dbc179e0eb56384
-
SHA256
242ad5c7f1838f9e531e34c56bb51e66a20acdf4b3b18ec68a4eb9969c6d332b
-
SHA512
30adf7357980c9bfafcf2f5641ba092cf41a350a1989183bf75603a52e7caf7e5040caa0066fa99299098c8dbb562862fa2c26d06c89c4b5f1befc2b86c2eb7a
-
SSDEEP
1536:CguZCa6S5khUIbCrKcTVu1R+1K0ddnto6ITrJR1pDcGa/M1NIpPkUlB7583fjnca:CgugapkhlbCrKgVARyK0jnoP1pDm/MsY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3060 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE 3060 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\242ad5c7f1838f9e531e34c56bb51e66a20acdf4b3b18ec68a4eb9969c6d332b.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3060
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD575b5ea765b8164052831a8fe373b8d7a
SHA1af44f310a0fb6a9dd3a15c6523974fef94ccc828
SHA25641e3e634e4c55a5ecf59a5be8cc3e5abcc7865178a80eedabd1477f5844950f1
SHA512506f336f7ce67812f471a0afe3bb78a6c4c4af4528ace5d315af5f091acc12d210ab4cccd1fb70ecf071b016bc752a5945634650ca074c5338894fa7cdd5808e