Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03-09-2024 16:04
Behavioral task
behavioral1
Sample
920f96788d41ba9a43556dfd4cbc1ba9b452dffce5a5b962107d3ffdcd5c7fed.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
920f96788d41ba9a43556dfd4cbc1ba9b452dffce5a5b962107d3ffdcd5c7fed.xlsm
Resource
win10v2004-20240802-en
General
-
Target
920f96788d41ba9a43556dfd4cbc1ba9b452dffce5a5b962107d3ffdcd5c7fed.xlsm
-
Size
13KB
-
MD5
90b0b5a51f143a5bd4efe22d767dcf1a
-
SHA1
1342cb0a36ac8371a9646dbcf9c3b47234002a7e
-
SHA256
920f96788d41ba9a43556dfd4cbc1ba9b452dffce5a5b962107d3ffdcd5c7fed
-
SHA512
2200dde2efa608ae89b74c4d041e2e1e44b7f29458d800849655d6670ceb6326a382c497548fcc0fec7613d8c893f306871fbf6b7090bfb4218f8a2590a0f47a
-
SSDEEP
192:H7UpMcgX6lPfrXpS0hDWOVelKCxxWBWb49hugLIJnHsrbgMS1bTk:H7+McQ6ZTp5WOCKCxoBWmLoabgm
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1900 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE 1900 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\920f96788d41ba9a43556dfd4cbc1ba9b452dffce5a5b962107d3ffdcd5c7fed.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1900
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD58049823dfa3b913c9ccd96554ca20031
SHA19bc98d75b969ce933030d891fbc64c70c9bdd5ef
SHA25649ce256bf5b1413fe3b5280e768a2fbcceec298b5f5b478019832af925dbae39
SHA512d6065089710fa12ffc7fab5aa8545e198aed069bc7f6a6191ab910c04cb044b51179f49f44a928b2fd07dfb51656629025d25dab6a95d52b4ede61fe15a4feed