Analysis
-
max time kernel
53s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28/09/2024, 21:40
Behavioral task
behavioral1
Sample
4720b3a10d20dbc471ae24bb1b63069600a9418f9a114c07fe6fb984124675a2.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4720b3a10d20dbc471ae24bb1b63069600a9418f9a114c07fe6fb984124675a2.xlsm
Resource
win10v2004-20240802-en
General
-
Target
4720b3a10d20dbc471ae24bb1b63069600a9418f9a114c07fe6fb984124675a2.xlsm
-
Size
92KB
-
MD5
da25da070ca1bc5f0e268cd368c15cf7
-
SHA1
bcfe868ae0504a955adf8402deda8f5b888f7c8c
-
SHA256
4720b3a10d20dbc471ae24bb1b63069600a9418f9a114c07fe6fb984124675a2
-
SHA512
79bccfe9b2b2c8c51a4414c00a279ae9126f8a1b6426d5b95a7f836288c0d5137297b2a302cbe4c317e8ca6eb1d08a07d0b7ac873c44725ebd32dda3a9082f2b
-
SSDEEP
1536:CguZCa6S5khUIb7aM4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIUiF+:Cgugapkhl33aPjpM+d/Ms8ULavLc7
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3248 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3248 EXCEL.EXE 3248 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE 3248 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\4720b3a10d20dbc471ae24bb1b63069600a9418f9a114c07fe6fb984124675a2.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3248
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD54149939127e5acb95e747cda8d013ce1
SHA19f48ace779161be73187f3d2f907c627adfeb028
SHA2561b01f21e74d93c17cd5f0cf92589394a409e8efefde85409b701f5418d1f3828
SHA51222027d557f7897c2b8b67b795397fc86a7230bebd765370da383f0074fe60de11d5a43268d7fe2728b04356dd6d117a9cbc080ede2395c3856d695857c79bb10