Analysis

  • max time kernel
    134s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    30-06-2020 07:15

General

  • Target

    INV3677290.xlsx

  • Size

    598KB

  • MD5

    557d7d397e7566fde718dd615add8e67

  • SHA1

    9ee2b02b3bc95d1ecaf9699198474e63c7b6d367

  • SHA256

    3c321c5bdc82d554ea695bb5927a9c23ffa7dd9301fabc68981ad4e0ac956a51

  • SHA512

    64ebf2803477edf7ccd614d286cbef6f3f7604b4f60de89f5a7a96199e44b4ddb19543dde3663b6080ab60f93185ccd3b40c7295a0e073188a28614f697eff14

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\INV3677290.xlsx"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    PID:792

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads