Analysis

  • max time kernel
    139s
  • max time network
    133s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    14/07/2020, 06:44

General

  • Target

    f62372d29cc82c0cf3aef7bbb0a0aafbee52987e4d441a52ba2378c540dbbe02.xls

  • Size

    199KB

  • MD5

    dde8eb947b39f4d13bbb0a99542c6a1a

  • SHA1

    4c8baadb0226facd3cf521d761808201bca24805

  • SHA256

    f62372d29cc82c0cf3aef7bbb0a0aafbee52987e4d441a52ba2378c540dbbe02

  • SHA512

    a419b757e4289b26b3761329165db5af4a68181f7e209a003fd5a4b9e7c26dcea5aa272ba26ae239e68b491acafa4f2f2d3c1da9954736bf11b257ed5742eaea

Score
1/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f62372d29cc82c0cf3aef7bbb0a0aafbee52987e4d441a52ba2378c540dbbe02.xls"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Checks processor information in registry
    • Enumerates system info in registry
    PID:2532

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads