Analysis
-
max time kernel
135s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
08-07-2020 09:23
Static task
static1
Behavioral task
behavioral1
Sample
844ac7548e10dd95f71103de03700662.xlsx
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
844ac7548e10dd95f71103de03700662.xlsx
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
844ac7548e10dd95f71103de03700662.xlsx
-
Size
14KB
-
MD5
844ac7548e10dd95f71103de03700662
-
SHA1
a102fe4d66c0969ea0a971ee9d18fda30f1a30e9
-
SHA256
830e8423cc6de38a9d8b660840f168dfeb3bd7dfd330060cf9ed9855e24f65dd
-
SHA512
43e42462b4138540296c58795acfaa9303040b97cffa74a812e3bd179f754f55f512e811fdb48e1ef0df5e173e0e888d13cf911cdd0b4ccad07d444a15b8702a
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE 2920 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2920 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\844ac7548e10dd95f71103de03700662.xlsx"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Enumerates system info in registry
PID:2920