Analysis
-
max time kernel
46s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/09/2024, 22:02
Behavioral task
behavioral1
Sample
0017f41970680cab649d2c14e652d3545ea04b8becb47908df57b709ce6fb76a.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0017f41970680cab649d2c14e652d3545ea04b8becb47908df57b709ce6fb76a.xlsm
Resource
win10v2004-20240802-en
General
-
Target
0017f41970680cab649d2c14e652d3545ea04b8becb47908df57b709ce6fb76a.xlsm
-
Size
92KB
-
MD5
9abd0d759733f69403d501397e46bbab
-
SHA1
40168dc4e3d65509fa083b6f7a01f56cf1e04f7b
-
SHA256
0017f41970680cab649d2c14e652d3545ea04b8becb47908df57b709ce6fb76a
-
SHA512
8d8bdc295ee12df01be92490a3f281fb53efb483bb252397cf6bc35af55653daeee16ece886b870cf8a66a1aee835b2d525f7fb678ce9a669723ba2267668d25
-
SSDEEP
1536:CguZCa6S5khUItE3svcaHurEHzVZdc3Ga/M1NIpPkUlB7583fjncFYIIMF8:CgugapkhlrvcguEzVzi/Ms8ULavLcY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE 2988 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0017f41970680cab649d2c14e652d3545ea04b8becb47908df57b709ce6fb76a.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize4KB
MD57e499edcd429714ebb10fefc01134900
SHA11d5cdd5f9525cb5dbbaaed0e466455e7266c5285
SHA2561f61484d18c2e04cf2563589ed3faf8a9a87594eb725a4666498925d15ca9b70
SHA512e0a095800e6147c88073f5f2d068e7ee01654803a379bd801100b571aaeb66da680d39e4ac2b151cb55d0e981b28f52621fe4d7727a7d1d581e2c796fbed49c4