Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:03
Behavioral task
behavioral1
Sample
d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d.xlsm
Resource
win10v2004-20241007-en
General
-
Target
d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d.xlsm
-
Size
45KB
-
MD5
1786bb670abfd760607243d905d828bc
-
SHA1
611c91e19bb875705a89e33844f548f852f95ea0
-
SHA256
d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d
-
SHA512
8e35a2168c31485d19a1f5b2d73a58cf6d02e65f386e866b64f4e5b87c0439e56e94f8754c8240df8aa5c993ea6253389731b1c25be2ad2c81f37ca37a8ed160
-
SSDEEP
768:++oDxDOevZCwrvt8zdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Ud0U2XCnM:BoDxD8tT5fTR4Lh1NisFYBc3cr+U2USz
Malware Config
Extracted
http://api.zmotpro.com/totalenvironment/logs/8wdgNaq0x/
http://aetoaluminium.com/wp-admin/gkqyKlzXoc/
http://24studypoint.com/wp-admin/3uEUtb/
https://baicc-ct.org/wp-admin/IwhcfC2sdxoToa/
https://mustknew.com/lovecalculator/osDBhPqx0tB1Vtp/
http://kiski023.com/wp-includes/Requests/Cookie/C/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 384 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 384 EXCEL.EXE 384 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 384 EXCEL.EXE 384 EXCEL.EXE 384 EXCEL.EXE 384 EXCEL.EXE 384 EXCEL.EXE 384 EXCEL.EXE 384 EXCEL.EXE 384 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d3bdc88768234f44048d4fcbb335b681ebeb937c263827ce751cbbe0d44b680d.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:384
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize2KB
MD55955a6e2ea17b88e5e3493a7460321e0
SHA16d565fe5a0202bfbd0ff0432fd8b3cc5a3f75e77
SHA256c5c831b220eb0444c704b0770b0f569207d008fe0d72a202e41f94b7314f96f1
SHA51221e4e39f3c74ee80fd3b5fdc488ec4f63976e2359882017cd795588a167eefb616dbedf45a6a6f5932ab4e883390f654b9a3efe1e2abca9f1450a5e49d932d61