Analysis
-
max time kernel
46s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2024 21:41
Behavioral task
behavioral1
Sample
efaf1bdfab6e2613b65cb452fb8caf95adce16dad3330450d18193e5d72f4a32.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efaf1bdfab6e2613b65cb452fb8caf95adce16dad3330450d18193e5d72f4a32.xlsm
Resource
win10v2004-20240802-en
General
-
Target
efaf1bdfab6e2613b65cb452fb8caf95adce16dad3330450d18193e5d72f4a32.xlsm
-
Size
92KB
-
MD5
ea9b0c6d9ada39077fe3b986dc0d1972
-
SHA1
877ff0b4feea99aaea261f7e0b326fa3f23ec031
-
SHA256
efaf1bdfab6e2613b65cb452fb8caf95adce16dad3330450d18193e5d72f4a32
-
SHA512
30e320d5058cc35655804d41b720e656328be8ca9000a6424d249beb58b1e82e51a5983485233861801c422629f212cde1a70f6c97f2df7450d4628cbf5d9ae6
-
SSDEEP
1536:CguZCa6S5khUIGqikX4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYII5vF4:CgugapkhlGEXaPjpM+d/Ms8ULavLcn
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3532 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE 3532 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\efaf1bdfab6e2613b65cb452fb8caf95adce16dad3330450d18193e5d72f4a32.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5c8417ef7b1c77a04f81d10d90588ab30
SHA1d513906c29c89f221482103c44b45d04bfc6a957
SHA256f6a86de2d6f48e77df7eb324b4eff33d33c8afc6e0a57cafa93bb4b6eb1575f7
SHA5128c4cfe0b846a472139e516d455ebaa57fa07751b158afa4594a2c03398fd5b40ba84a37f4f53097f928c7b560f4e828d09e67639358e3265ff98287ff35199d8