Analysis

  • max time kernel
    140s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10v200217
  • submitted
    09-04-2020 15:24

General

  • Target

    267a6da880b87fbb3c74e8ef84f469d6795f450c.xls

  • Size

    209KB

  • MD5

    05f0733ab9c8d500e5c8b728b73a359f

  • SHA1

    267a6da880b87fbb3c74e8ef84f469d6795f450c

  • SHA256

    0ef9ba966074be3b356f51b89df07a7b7345b694dfdf9f68b0009615d5ce28fd

  • SHA512

    458d6b15953ffda2e3e589962ffc748d12dd6a1c37e6261af3c2bc954793655d5e231e3390ab43984be7daafa0e6fb1e0d57471ca027ccb704c98037dd1a6829

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\267a6da880b87fbb3c74e8ef84f469d6795f450c.xls"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:3972

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads