Analysis
-
max time kernel
46s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 21:58
Behavioral task
behavioral1
Sample
1a3a9d76151c256298bbe1a6557222822610c264965980896a63aa3b4c2ea14d.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
1a3a9d76151c256298bbe1a6557222822610c264965980896a63aa3b4c2ea14d.xlsm
Resource
win10v2004-20240802-en
General
-
Target
1a3a9d76151c256298bbe1a6557222822610c264965980896a63aa3b4c2ea14d.xlsm
-
Size
92KB
-
MD5
6a5dda433b2a596464a151f29b94e1b6
-
SHA1
d15f513662747aa9ded2ce96efa77346fa462077
-
SHA256
1a3a9d76151c256298bbe1a6557222822610c264965980896a63aa3b4c2ea14d
-
SHA512
7d304d6b23458f482e21b0ff21e2fa964866abe27ab4ee9b9a698fafd32cb50328c0860b30905b3b833ecb7f8740dc354fbd1f8717942dfe2b0a1af286f1cca0
-
SSDEEP
1536:CguZCa6S5khUIgm0094znOSjhLzVubGa/M1NIpPkUlB7583fjncFYIIMRFQ:CgugapkhlgP09aPjpzVw/Ms8ULavLcfw
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 644 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1a3a9d76151c256298bbe1a6557222822610c264965980896a63aa3b4c2ea14d.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize667B
MD53ac6623b597872bf7e1dc0b7df197810
SHA1bef074bd3cf10eb6459b6dee5828776158e5e1b4
SHA25640f50a4faf101821d0c386d00f8395daf32d1dc0be62d2cadb7b1428dbcbe8c2
SHA5127e0c94c1ff760030236dced438a60174da7268d4f866a18e01bbb6a59e6be1e0321f435b686ee053950ecdcc9ca17cb6ec2533bfdda1ef2f5933edc62dc177d2