Analysis
-
max time kernel
137s -
max time network
133s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 11:00
Static task
static1
Behavioral task
behavioral1
Sample
INV20200716CATALOG_DESIGN_PO.xlsx
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
INV20200716CATALOG_DESIGN_PO.xlsx
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
INV20200716CATALOG_DESIGN_PO.xlsx
-
Size
14KB
-
MD5
9a8024a499fbd0528ce3a41f641225b4
-
SHA1
ee2d4450412bb4092d62168a43a4e66a8eae4e8a
-
SHA256
dc58e47ae7ee4c62f5733e94de8e157de3cb6b3b21f013ea1fc6d923f47a6e69
-
SHA512
37e3f683a4a15e6c5b7d1310685c785e05475d31bba592ef8b65fdc54095b51e2698082c9d8bc09910f368e1b2f3ad0df8bd167eabdf8b0b85122ff8e94dea06
Score
1/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE 1356 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1356 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\INV20200716CATALOG_DESIGN_PO.xlsx"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Enumerates system info in registry
PID:1356