Analysis
-
max time kernel
47s -
max time network
35s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 21:06
Behavioral task
behavioral1
Sample
044ba75b5c6e2f3ddcc524a5f7a2bed16eb88c8b3caa067f570d2fb7b3eb3c70.xlsm
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
044ba75b5c6e2f3ddcc524a5f7a2bed16eb88c8b3caa067f570d2fb7b3eb3c70.xlsm
Resource
win10v2004-20240802-en
General
-
Target
044ba75b5c6e2f3ddcc524a5f7a2bed16eb88c8b3caa067f570d2fb7b3eb3c70.xlsm
-
Size
92KB
-
MD5
258d47970cd237a288425a7930212839
-
SHA1
612886b1c270067719173ff87e9a9a923be16043
-
SHA256
044ba75b5c6e2f3ddcc524a5f7a2bed16eb88c8b3caa067f570d2fb7b3eb3c70
-
SHA512
9d331a76f7a0820c48987114cfef81e1bb62d3c39b950b479fd8c6f3724f31f29e64f490357b805d2fb0940e91c445060e307099e0a2dfdd6eab74621d7aa853
-
SSDEEP
1536:CguZCa6S5khUIpP1bE4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIInIFY:CgugapkhlpVEaPjpM+d/Ms8ULavLcm9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2336 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE 2336 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\044ba75b5c6e2f3ddcc524a5f7a2bed16eb88c8b3caa067f570d2fb7b3eb3c70.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2336
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD5b7f0debec0258f3496d76a4601ac0440
SHA170f77d10daf1ee7e3e60439bbce9f60831ce2eeb
SHA25690a31e4835771e686abc0803574f3f2201987e876c0dcd5db815d791b5052d24
SHA512caf009eeb539680263d9723d4f2d4949fe2034e89e6540381fd5cf1a5616d4053ebc8956578919340788d72bc2e2ac2fef71dd6a7c3d5edee4d903eecfc58192