Analysis
-
max time kernel
133s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 23:07
Behavioral task
behavioral1
Sample
cd5696c523151ddbf23ccadaac0eaa6deda3240fc944c4a819600955cc6b6dac.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cd5696c523151ddbf23ccadaac0eaa6deda3240fc944c4a819600955cc6b6dac.xlsm
Resource
win10v2004-20241007-en
General
-
Target
cd5696c523151ddbf23ccadaac0eaa6deda3240fc944c4a819600955cc6b6dac.xlsm
-
Size
46KB
-
MD5
11322742dc157f4304afa18787968d66
-
SHA1
6f7268de34f068fcb74d1b9210ee8ef33d764b24
-
SHA256
cd5696c523151ddbf23ccadaac0eaa6deda3240fc944c4a819600955cc6b6dac
-
SHA512
902167c365c30abcd44233b37770d8c97910ec88550a541b3fe0432e798ea024cfd124b7c20ae2e2da4c6b190dfc9059a1734e29b27ffd175592bb5d55717b23
-
SSDEEP
768:ueoPDOevZCwrvtQazdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Uh0VU2etZF:FoPDFtT5fTR4Lh1NisFYBc3cr+UqVUJ/
Malware Config
Extracted
https://goglobetravel.com/wp-admin/1O1Tjr9nHBV/
https://pakistannakliye.com/wp-admin/dyfAdRkv7/
https://spinoffyarnshop.com/content/YQlmbLaB/
http://murtjizindustry.com/wp-content/yI6/
http://nazrultheking.com/wp-includes/LZ/
http://hossaibmojammel.com/wp-content/qFPghprWO0ONxLFA5d/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5072 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5072 EXCEL.EXE 5072 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE 5072 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cd5696c523151ddbf23ccadaac0eaa6deda3240fc944c4a819600955cc6b6dac.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5072
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5ef85de9ef47f14aab072f890a89255ee
SHA1df212683fb875f191b3271befe19e08436c180e6
SHA256c2f3589b958e1663f69bcc8927577e808fdce3eb158dc7503669145ede6f175d
SHA5128c262a4a28321707e02d2b68056cae8f836eb7538fe2f2d1725c4a395e9805ef1b66d695232fe44a405f9e94f228ff76afac017dee78b0de80ca11b16228e8e7