Analysis

  • max time kernel
    135s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    31-07-2020 10:05

General

  • Target

    form_0017808412.xls

  • Size

    487KB

  • MD5

    646d8359ec26e1c269f4c7941f6687cb

  • SHA1

    6d7236322b7ad4b6b708a6197f6c0cb4b9ed9e78

  • SHA256

    f3d212c5db0dd27e3ab89df542dfea07249dc31d7ef769add18a655f15becef0

  • SHA512

    64af01c62bc79ce4dd93cdf1de827772e7072022e448d603f913b2bc333c7b45d1afa47dc891831f56f052cef94ce6e40a7d526900150397689942d06446e9c5

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\form_0017808412.xls"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Enumerates system info in registry
    • Checks processor information in registry
    • Suspicious use of SetWindowsHookEx
    PID:3104

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads