Analysis
-
max time kernel
52s -
max time network
56s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 22:01
Behavioral task
behavioral1
Sample
78016d3b8362db6370b5c386012c6bcedcca8655373779a8ccf3a3d0055a456e.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
78016d3b8362db6370b5c386012c6bcedcca8655373779a8ccf3a3d0055a456e.xlsm
Resource
win10v2004-20240802-en
General
-
Target
78016d3b8362db6370b5c386012c6bcedcca8655373779a8ccf3a3d0055a456e.xlsm
-
Size
92KB
-
MD5
f80b2da2e8974f952053307806061299
-
SHA1
7b0c1c6e5d3407180ec5748a0349fc651b718180
-
SHA256
78016d3b8362db6370b5c386012c6bcedcca8655373779a8ccf3a3d0055a456e
-
SHA512
0d81bd07d092e7fea018ab425bc20d3c3d609d393270fc646549fa78ca9d6781a39cb6229335481f52e3b8c47cc0df9121071c39f163e40d52c50dc875b32361
-
SSDEEP
1536:CguZCa6S5khUIH5w5EHSX7nb1dN4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIA:CgugapkhlHueHSLb1naPjpM+d/Ms8ULZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4080 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\78016d3b8362db6370b5c386012c6bcedcca8655373779a8ccf3a3d0055a456e.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4080
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD501c8979ac5a5d2f85fcc10c5a87e65af
SHA1c4f0ee5de471278419825dd4613934d0bfc675a7
SHA256f7e82efd6ad988f044d343160eae96612cf912b5174ba714417e0d572aeccb58
SHA512d554fd68b4932722d813a04be47386c48d9cb6243898ccf2007cce74f2ac90600f80619ee6bde0cb9f680a32a3f98e4edf9a3fd596a37c559a3339814be4fb2d