Analysis
-
max time kernel
133s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 22:39
Behavioral task
behavioral1
Sample
e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8.xlsm
Resource
win10v2004-20241007-en
General
-
Target
e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8.xlsm
-
Size
40KB
-
MD5
c0b0fa3a9fe1a94c0ca1f2ac1353d57d
-
SHA1
e52e0f919d08efc0fc3a076a887a2bbb6f46b2ca
-
SHA256
e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8
-
SHA512
4d3169ecfa3717c223324290739d3aea37ea6d729fc64af444ff6170aa85bac296b0b714a3d8c9dc255f76f33c7422deea55400bc6e5082b4cae58c093e3323c
-
SSDEEP
768:qXomZDOevZCwtvyKfcrND59V+L9Rw4eWrXcTqZ0VPH+t:2omZDzylND59V4jwmXc2CVPu
Malware Config
Extracted
http://radiomedenine.com/kidfngb/h3a3D5WRS/
https://mobapkapps.com/wp-includes/JcEqRwhEw0/
https://bhandariclub.com/iwdfol/X64nJKK8fsiQcbkW5MN/
https://welcomelanguages.com/factoo/7Wz9qXX7QSjXm0VPM/
https://deine-bewerbung.com/wp-content/HHotdOzCFlW/
https://wewin21.com/wp-content/NITdYcwbO3C1uJd/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2320 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2320 EXCEL.EXE 2320 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2320 EXCEL.EXE 2320 EXCEL.EXE 2320 EXCEL.EXE 2320 EXCEL.EXE 2320 EXCEL.EXE 2320 EXCEL.EXE 2320 EXCEL.EXE 2320 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e05ae88fdae10ca621f0a49ce9278d1f677004358beae1450cea0cd7b442aae8.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5cf2e6e630df2c7fb3bc80aa8cd2873a1
SHA10e78529743147ef04f2d392a3183d6eee9501a9a
SHA25629a454e2dc8ae11aa59475eb8f41518742507396ec36df73925d46a477d5a05d
SHA5123ba8e4ef28da31b6a90bad392810359837db8e93b2882a7850ba4e5a06e6d71bd50812961836d5fcad117a575431a8e5878550251bcbb296ce918e7e92be47a3