Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 19:05
Behavioral task
behavioral1
Sample
20b14ee52b40ee1bfa1f029c674b0e1a84d96e0611f5df818b417009b580eb31.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20b14ee52b40ee1bfa1f029c674b0e1a84d96e0611f5df818b417009b580eb31.xlsm
Resource
win10v2004-20241007-en
General
-
Target
20b14ee52b40ee1bfa1f029c674b0e1a84d96e0611f5df818b417009b580eb31.xlsm
-
Size
45KB
-
MD5
f36d287c36c14b5026a374ca99ee80b4
-
SHA1
455de8b0538a04eb0987643080828b1c4872a01d
-
SHA256
20b14ee52b40ee1bfa1f029c674b0e1a84d96e0611f5df818b417009b580eb31
-
SHA512
5cb8304fc7d8d68a146ad8fe6f2660b8a0afc2a0ce76400c957518bafcf6e1307941f2096f9e7eb1206486a619b4927ba0fdb22ac8b7f6de86682d021f56dfa8
-
SSDEEP
768:0hoExDOevZCwrvtPzdDTKufT9nz0LTyY1NiMZFYpvrLeci3cr+Ud0U2qfF:GoExDztT5fTR4Lh1NisFYBc3cr+U2U9N
Malware Config
Extracted
http://rashed-uzzaman.com/wp-content/XIup3T/
http://vrstar-park.com/wp-includes/9k5kouiyN4tPr/
https://www.swaong.com/assets/Kjy6uoiLsR4Y/
https://starzfoundationtrust.org/lori-toll/aOFfl4bO/
http://vulkanvegasbonus.jeunete.com/wp-content/gGLZbxD/
https://edicionespamies.com/wp-content/PtqJQPSAg5K07Mf/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2524 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2524 EXCEL.EXE 2524 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE 2524 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\20b14ee52b40ee1bfa1f029c674b0e1a84d96e0611f5df818b417009b580eb31.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2524
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5c519523011a4a8471a7b3112f79648e9
SHA14ea9faed37da041c989d531893fdfe02cda3db42
SHA256e378ce136dfe788c7bf4c608aac7e734f11767a72b35cf49f3ac9c20160c5279
SHA5127ee6de9237a885ab847185292e068e67fb258b62a9a30b0e9370bd569da7dfde78f1aee6440a30c144d45455e7660d062129e8f5c014564e1ab53ff48d4ba449