Analysis

  • max time kernel
    263s
  • max time network
    162s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    02-04-2020 15:59

General

  • Target

    sample.xls

  • Size

    113KB

  • MD5

    0e3bf9cbb3a039aa2b7a9b099e08d773

  • SHA1

    de641034eed472a8571d367c715d13fc2d75dd8d

  • SHA256

    ca69dbab2f4809aaabd5741447ac100ca0d4784b0905fa0adbbf85f0b5dbf07c

  • SHA512

    698c151f15c16f8c5ca21f5d738c39a96540e05a480c263301a6703a692b8e3c2f901ac04ac17f31ebedd3116af8835c57bf1432fc5a557f5f6c1d901300f020

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\sample.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:3684

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads