Analysis
-
max time kernel
46s -
max time network
37s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-08-2024 21:14
Behavioral task
behavioral1
Sample
845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e.xlsm
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e.xlsm
Resource
win10v2004-20240802-en
General
-
Target
845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e.xlsm
-
Size
151KB
-
MD5
8c5e461350c0146f8931ff9e38ab7d7b
-
SHA1
fcba480fe7abe421203dad3dcaaaec8994771066
-
SHA256
845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e
-
SHA512
f9b54d507cf518e13fb061f456ca21f645388a3e807243d17743b10b81b997e9a7f889dcffcf304f57a39c9674d83b68b3456703e9a1b7ac1033d56a4524594a
-
SSDEEP
1536:MFIYe0yJyriy/kEbrogaY6FtkVSwm7c22e1vmLomjqmQcW44N+:kIYVriuVHNItLF1v07LQcW44N+
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2720 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE 2720 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\845499f38eeae223675d9f1335e805dc38b0616352901c54c8ef0a0ec687040e.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2720
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\5VLNVQUATI9FLRH26RYK.temp
Filesize1KB
MD5b6f25b907bf395aa418c1c03ee978522
SHA1ee97a3f5221916c7d5927942ed66dcd65d9b0579
SHA25628597e0cec6f29cc47b7def5a8651e3aafd964ebe4a80446f061022a37a680e3
SHA5123bb24d282257d3c55b11943cb3e5261711437a08ec616a581263ce0b1744925d5d96d75ddef60e530efdf77584ffaa668173a9b4fae35e7eba5775e4121e1d2b