Resubmissions
12/09/2024, 09:13
240912-k6p1qazhmc 612/09/2024, 09:08
240912-k4c85szgrp 712/09/2024, 09:05
240912-k2nxvszgpk 312/09/2024, 08:49
240912-kqzj8azelj 3Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
649884-CYP-TCK-EBL-CF-1040393H1E-M-24-08-00-01.csv
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
649884-CYP-TCK-EBL-CF-1040393H1E-M-24-08-00-01.csv
Resource
win10v2004-20240802-en
General
-
Target
649884-CYP-TCK-EBL-CF-1040393H1E-M-24-08-00-01.csv
-
Size
718B
-
MD5
5e7a43943b7006dbdc7be3a34f1a14b1
-
SHA1
1f26bd43e186ceeb952530cc00ef1c4f2c617f16
-
SHA256
7c3c2152f63380c81f911edac7a9876c4f53cf4ce48fb3e992ef0fad32aa6821
-
SHA512
bcfc013fc0c537593562a1033482fef33e54d02e8b9bef898208922aaf7465fc09eed0b14f013525fe289ffd9c3d2baa35ec03272d1416798c46d5ad879d851d
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4032 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE 4032 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\649884-CYP-TCK-EBL-CF-1040393H1E-M-24-08-00-01.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4032
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=2820,i,10369132178352108590,11047993562598554317,262144 --variations-seed-version --mojo-platform-channel-handle=3760 /prefetch:81⤵PID:4912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD547eaaba32b9501f21c1058e85f18ffce
SHA1c9b5db48f35d381d9b1e7a334d6cd3a4f341af85
SHA2567d485fa39426e3da62e134f673e24d63097334a2448bd31954ce4a39c4115c7a
SHA5129669ff544cd5854072243a0d14c6afbaaa2a09cd93c1d3e1d39eaeda638a3342358460ad0e28d3d38e4bae9d494b4061fe8f500e9c5b0605fd17ce265ef4278f