Analysis
-
max time kernel
46s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09-09-2024 21:04
Behavioral task
behavioral1
Sample
150ca86b83b4b18f0cb58e52d2f1530cafb1bab238877d6c1cec723a94cb90ec.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
150ca86b83b4b18f0cb58e52d2f1530cafb1bab238877d6c1cec723a94cb90ec.xlsm
Resource
win10v2004-20240802-en
General
-
Target
150ca86b83b4b18f0cb58e52d2f1530cafb1bab238877d6c1cec723a94cb90ec.xlsm
-
Size
92KB
-
MD5
d794f7ac0101695fdbb3ccf819732da0
-
SHA1
f07ae70b01923ea965716663be920a034400baf8
-
SHA256
150ca86b83b4b18f0cb58e52d2f1530cafb1bab238877d6c1cec723a94cb90ec
-
SHA512
5c753b63d52de1a8df9856a40a9eed78861c6927046166790676146580327fae76f783e028a63c1007ed1e5870ac8107000bfe6600e7ffb20c9913e9b8743877
-
SSDEEP
1536:CguZCa6S5khUI6VveMOq4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIrlFA:CgugapkhlkvzaPjpM+d/Ms8ULavLcZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1100 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE 1100 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\150ca86b83b4b18f0cb58e52d2f1530cafb1bab238877d6c1cec723a94cb90ec.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1100
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5afaa6abc9c0879f48761bbf733813d7e
SHA1ebfe32c4a46178f02dffecb2565115ed3156742b
SHA2567694ebcccfb8fab638c2eadb10e79f5789fdfaa9a2a06219b70d158256ef8aa9
SHA51267e695e1d24dbbbd1ecc80c5451d1b9ff436a81e5b2cc519489096432c355c4d66974eb638882663ce4c68e5178e33b0925ca735ff683b51bac7f151d20d7da5