Analysis
-
max time kernel
46s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-10-2024 22:08
Behavioral task
behavioral1
Sample
3dfcc0dffffba57591956c5c6777b1a0485a7b4c1c041e27bdaa60f16e31a907.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3dfcc0dffffba57591956c5c6777b1a0485a7b4c1c041e27bdaa60f16e31a907.xlsm
Resource
win10v2004-20241007-en
General
-
Target
3dfcc0dffffba57591956c5c6777b1a0485a7b4c1c041e27bdaa60f16e31a907.xlsm
-
Size
92KB
-
MD5
d1479bfe6ed3749b3a93f143d39d0a1e
-
SHA1
8bc808ee72d1376d0ca6f24c3c971e2ca8d88700
-
SHA256
3dfcc0dffffba57591956c5c6777b1a0485a7b4c1c041e27bdaa60f16e31a907
-
SHA512
b39e3a2fde15530e76d390bd19eee4da6216e95e6d278e066c2ba8afe5aa6e189d363013abae58969e40d4654359329d8b07aa50487f0e93293661a80849836d
-
SSDEEP
1536:CguZCa6S5khUIBP8zuOZZ4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIYrFX:CgugapkhlN8ZaPjpM+d/Ms8ULavLcb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 392 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3dfcc0dffffba57591956c5c6777b1a0485a7b4c1c041e27bdaa60f16e31a907.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:392
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5d0260431c8e287b7aafcbc09936f128b
SHA1b8e2fd5d32a50b6a94ff49afcaa372dae34f20ef
SHA256454ffe499ea9e7b66988c44eb5cad77f71e5b5625868dc0023c943f6baef4189
SHA5124189f5b0fcc6d715ce1dea6d28ad368b73136ec83fda684f8e15d6cb48cffce7691a929b2c6cb30cec4cbdcb39aa6f0925681c076b0f8d307f8149bef1c50543