Analysis

  • max time kernel
    144s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    29-06-2020 18:22

General

  • Target

    Services-pricelist.xls

  • Size

    80KB

  • MD5

    4ff01f434fc4e749b6849f8f91df592e

  • SHA1

    edd85c3426323f9b501b93ccbc9db26b5dc3bc98

  • SHA256

    1b719ce08de027c58ea2b699753a9189337f1b80f78c342f9f02dee8a8ef6f84

  • SHA512

    4684670830b255df62d9f146476f341b46f5b6b8285c568326377e098ab4bfcce4424b13ad0e02c22f5c5c81a1c522fa226f363ed013f94430771026af814258

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Services-pricelist.xls"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:3824

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads