Analysis
-
max time kernel
47s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-10-2024 21:12
Behavioral task
behavioral1
Sample
56df6a72d9854e095045b2d43efb14e9e7049a3b289b371265a4a8612c2a3548.xlsm
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
56df6a72d9854e095045b2d43efb14e9e7049a3b289b371265a4a8612c2a3548.xlsm
Resource
win10v2004-20241007-en
General
-
Target
56df6a72d9854e095045b2d43efb14e9e7049a3b289b371265a4a8612c2a3548.xlsm
-
Size
92KB
-
MD5
23a237ef6b3a4d4c8017316ce1fb7a44
-
SHA1
b282a9252b243e89b302ba1ec6dbed4fa2cb1447
-
SHA256
56df6a72d9854e095045b2d43efb14e9e7049a3b289b371265a4a8612c2a3548
-
SHA512
2401a000c9e378913bc64c09f19830836e6f61a1bcab36c5735e0be90aed3dd197fce58d29a75127845501010c48e94ffa42183b71b235a6055ebf03357c14da
-
SSDEEP
1536:CguZCa6S5khUIMFLu8d4znOSjhLzVubGa/M1NIpPkUlB7583fjncFYIIUUFy:CgugapkhlOLpaPjpzVw/Ms8ULavLcB
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4848 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE 4848 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\56df6a72d9854e095045b2d43efb14e9e7049a3b289b371265a4a8612c2a3548.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD53c83938df1f6de83cc9c1566d9b696d7
SHA1398853d1544cd758ed983e1556ea2f084c28e1aa
SHA2567d47537f7da4f35cbc134c68590910b87209c396dd9478ccaf26544fab6874f9
SHA512a5fd1d6286bf73b81333ca12cd88b358451be2d32e1438ac87de5919546f178fb58b3ecf4eddc54fcc5ce87e75f170a18922461b823e60bf4f765a9d113349cc