Analysis
-
max time kernel
60s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2024 21:17
Behavioral task
behavioral1
Sample
291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb.xlsm
Resource
win10v2004-20241007-en
General
-
Target
291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb.xlsm
-
Size
92KB
-
MD5
3c7e89cd5d37cd4ad46c9afafbb396b5
-
SHA1
a598052938f1eaa191882285e418b0b4eeed8042
-
SHA256
291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb
-
SHA512
3b748957b4bc25bf8dc7cd64a92ff3238fe4ed185516e6686bf7221f4212d82c856cca89925264a6e9389243499b80e91d6e0447ab50edf17444335dd6740a0a
-
SSDEEP
1536:CguZCa6S5khUITWHTp4znOSjhLM+vGa/M1NIpPkUlB7583fjncFYIIHFp:CgugapkhlTWHTpaPjpM+d/Ms8ULavLc2
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4116 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE 4116 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\291e948f69fb886a89c8c2d53da84955ebc8e27a0b1ed410b284c846a3a912fb.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4116
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5969954db0ab00bd579929459fe4758c4
SHA195c7e049cebfaec4e54a11da29762b758e25b859
SHA25626a728005b23ea3fc31b127fcbb8d1b47529f51a758c2b0b2eb99565ad1a5f80
SHA512a4dd67cfcf2e9e123e516adfb7cc306fa7867c9c7bf4fdad8f76eb7a2ce9896f17e95a32aad1e55f388264c842621acc5ee10c29e0ad08aa2a4a89182b33b887