Analysis
-
max time kernel
47s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 21:59
Behavioral task
behavioral1
Sample
7b58c253c23666a5a53be221ea5eea02f0391a92b590311f851fbaeee040c9de.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
7b58c253c23666a5a53be221ea5eea02f0391a92b590311f851fbaeee040c9de.xlsm
Resource
win10v2004-20240802-en
General
-
Target
7b58c253c23666a5a53be221ea5eea02f0391a92b590311f851fbaeee040c9de.xlsm
-
Size
92KB
-
MD5
2610adda4da2cdc3ade7ff0250e236b6
-
SHA1
df540f37f8db94a9ae0178db70b75d962d710148
-
SHA256
7b58c253c23666a5a53be221ea5eea02f0391a92b590311f851fbaeee040c9de
-
SHA512
b2390e0a4b44314806dda461cdddbd5d8f8e0c1cb23767593ed9f3e5c2fbba84e2600e8b4b8d82cf50ee7f3bc8d2419ea5ec3382400ab294def25464c50b5e32
-
SSDEEP
1536:CguZCa6S5khUIm/59zR4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYII/UF4:Cgugapkhlm5dRaPjpM+d/Ms8ULavLci5
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE 3244 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7b58c253c23666a5a53be221ea5eea02f0391a92b590311f851fbaeee040c9de.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3244
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD50641b3612da634ae12d9bad2f54604de
SHA1667c7c6f4032f05202d775dbebaec9719ad8164c
SHA25692fd5a940ca0c09079ca92d8072936a4ea09e01e05d65630975064862cd34234
SHA512b28883461ae13979f1af109c4746153068322ec200ed28c4096a5b6dd33414dac1b93375d68d2e12f6c14156396b2be7de10c5fff4b22844b90f69e1656fa8a2