Analysis

  • max time kernel
    139s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    08/07/2020, 09:23

General

  • Target

    e6a23c041bb605c568af9348bc6fccb8a223abc7e821bc6d8e9bac3901d5dea5.xls

  • Size

    14KB

  • MD5

    7e15914dff4b3378ad15968d2da41ab0

  • SHA1

    608da239422e5ad413545319035209c135d617a7

  • SHA256

    e6a23c041bb605c568af9348bc6fccb8a223abc7e821bc6d8e9bac3901d5dea5

  • SHA512

    93ee77eb08c0c6ca38aa6164fcfa33f231cfb98c5b0aa79ec908f9a488c69b0f8089622e7a5ff0e7cc6c724638562a3186131a76a9b4614d21758c727f03a742

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e6a23c041bb605c568af9348bc6fccb8a223abc7e821bc6d8e9bac3901d5dea5.xls"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:724

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads