Analysis
-
max time kernel
47s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 21:38
Behavioral task
behavioral1
Sample
73f071a6abee7aae6a3798dac771777b581437234864b2cd024413876fafa203.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
73f071a6abee7aae6a3798dac771777b581437234864b2cd024413876fafa203.xlsm
Resource
win10v2004-20240802-en
General
-
Target
73f071a6abee7aae6a3798dac771777b581437234864b2cd024413876fafa203.xlsm
-
Size
92KB
-
MD5
80ba27c3bb441bfc6c0a5d08fe6ae7f6
-
SHA1
7aa450d4210e2d82d53c94cf873361151866e128
-
SHA256
73f071a6abee7aae6a3798dac771777b581437234864b2cd024413876fafa203
-
SHA512
4a5fac69736a46d29320b04170d3b52c865145bab0d17c49f55788a6583e669c316c18e1f7f9daaeabcdc902b141422bb48fbbe8f16e233c91ce72c41efc4067
-
SSDEEP
1536:CguZCa6S5khUI0YdFZTOP4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIuFlZ:Cgugapkhl/MaPjpM+d/Ms8ULavLcDZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5016 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5016 EXCEL.EXE 5016 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE 5016 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\73f071a6abee7aae6a3798dac771777b581437234864b2cd024413876fafa203.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5016
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD50319aa3ed75671938220ba6f0debfedf
SHA149e44c6ede7da22c35a24879e0b61cb70d00b7f2
SHA256f55e7f51b7c2fd5ee1fd2ee134b7078e0bf8c47df2967cdef092c2463ccea8c8
SHA5126821094f44022815b46c75966d7aafe29b0008336baf3505986bcadd9835c775aa1fb75c876655591993b4a53dc0f7c7f30fde681a2dc7dc34a1fc9a60cd1a91