Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 21:04
Behavioral task
behavioral1
Sample
e13cfd2ac05ed539d0664b7b869851bc0c6efa0d12c3ee51ab3d68f301f2a361.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e13cfd2ac05ed539d0664b7b869851bc0c6efa0d12c3ee51ab3d68f301f2a361.xlsm
Resource
win10v2004-20241007-en
General
-
Target
e13cfd2ac05ed539d0664b7b869851bc0c6efa0d12c3ee51ab3d68f301f2a361.xlsm
-
Size
40KB
-
MD5
b6c259e9e025dc20ebf5cf5aa0bc7b2f
-
SHA1
62c46d46f288acd557c9920cf9ecce8071a46881
-
SHA256
e13cfd2ac05ed539d0664b7b869851bc0c6efa0d12c3ee51ab3d68f301f2a361
-
SHA512
2d3eb9f45ab3a8770b633ae21413bfa9f7530faba371f3eec590cebe406eca5597e51c7cf6e3893f259ab001e3e24f40f9836477c84ff263ac2bda18c36828a0
-
SSDEEP
768:6bomCS/DOevZCwt7OyKfcrND59V+L9Rw4eWrXcTqZ0VfddDhw:qomd/DmylND59V4jwmXc2CVfdxi
Malware Config
Extracted
https://linkmys.com/stats/nnF/
https://livejagat.com/h/UDwLU4FTwf/
https://ticsnp.azurewebsites.net/anko-agust/treN2T/
https://paintingsouq.com/l93mxsk/Ich7kJF7n3Fu5v/
https://sanvicente.group/wp-content/dBsh5232WHIsiwyQAln/
https://novinex.net/wp-admin/p9FV5/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1216 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 1216 EXCEL.EXE 1216 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid Process 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE 1216 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e13cfd2ac05ed539d0664b7b869851bc0c6efa0d12c3ee51ab3d68f301f2a361.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1216