Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:33
Behavioral task
behavioral1
Sample
f3bc579e711e495bd24d35f8aca0efa2877802452d25b37c34e11047ca247ae7.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f3bc579e711e495bd24d35f8aca0efa2877802452d25b37c34e11047ca247ae7.xlsm
Resource
win10v2004-20240802-en
General
-
Target
f3bc579e711e495bd24d35f8aca0efa2877802452d25b37c34e11047ca247ae7.xlsm
-
Size
92KB
-
MD5
0e02f9032301e1e11e9d3e373ad6bc4e
-
SHA1
7afe66f844f53840a1fb7edf1f63f8bd0b27f1d5
-
SHA256
f3bc579e711e495bd24d35f8aca0efa2877802452d25b37c34e11047ca247ae7
-
SHA512
9036787a6f0b19f32aac96ff6b8c851efffe38cfbd607b847a4c209357cd81c767abfbf264f77a3570c17a9be27bb2006876c9d71934020616783cff283ab0c2
-
SSDEEP
1536:CguZCa6S5khUIYFvbMCqHzIPU4znOSjhLzVubGa/M1NIpPkUlB7583fjncFYIIwm:CgugapkhlYhIT7aPjpzVw/Ms8ULavLce
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4636 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE 4636 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f3bc579e711e495bd24d35f8aca0efa2877802452d25b37c34e11047ca247ae7.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5a507e909bf15e2653fb2922757f9939b
SHA1c49711609574f18e160a1fdf7497e7bbec3b71e8
SHA256c19271724db39dfafbe401dc2ad2c323fc450848840a232610a30aefecb7d667
SHA51213204c2bd1adacaa0ad772c17b80640e020768ba2e07445edf7cebad86e1469ba910505aac1af71919f4a413e7f029ec017d35bba4dcae0950e16bf55890fdc2