Analysis

  • max time kernel
    136s
  • max time network
    129s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    16-11-2020 18:28

General

  • Target

    document-1497119665.xlsb

  • Size

    332KB

  • MD5

    aed5d442048b92c2ffe82ced2ab2d488

  • SHA1

    7a865502871f04a2f6747c4fd9d21503f92b13be

  • SHA256

    b08c179b6877c15bf1cf1ecbe0c8ca2beb39b758d3987f4abec1b925ca5d245e

  • SHA512

    7e25817044fbca704b9e7dde11161d40a05250bea8ef18a52c39e4516c19aab70ec735fee864565eaa48bbf6e805cb2f8a4cad2574c981d837a50ad6842a3f4e

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\document-1497119665.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1124

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1124-0-0x00007FFC81F10000-0x00007FFC82547000-memory.dmp
    Filesize

    6.2MB