Analysis

  • max time kernel
    138s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    30-06-2020 05:48

General

  • Target

    UOD_1004.xls

  • Size

    364KB

  • MD5

    fb7103737708c995ca3610991cd153b4

  • SHA1

    57c71c49cdd5adbd6765b067e7cba4ecaa8263f3

  • SHA256

    9c8e1b2166d0ee3df1c3fc9c6e4f16fe6378be10fa7f9ed2eac4e84139d7f152

  • SHA512

    d3dee4dc857b5d98f062148a1682e29af80400387eb3d27d4d73c4a971d482b9071021c2534f5e8c563bea0f7385be8b63bf5cdec82706795141863d404a9696

Score
1/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\UOD_1004.xls"
    1⤵
    • Enumerates system info in registry
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    PID:2416

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads