Analysis

  • max time kernel
    136s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 06:03

General

  • Target

    Pre-order.xlsx

  • Size

    2.2MB

  • MD5

    ff38cf4d7025c0a5be3d81ac520c498b

  • SHA1

    2ad3bf55a7ac4c636ecdf1b703d46afd190b9525

  • SHA256

    cadb48c6d6cb9a5806bb74899c4837916538e2b9257dcc0f28640cc8179fd391

  • SHA512

    039351f7634ef17c18047c4f1e4fa2be2e71660f814019c014e69900f3a4fcc4c9153a1656d4e1ae15ad5203a2db5a2679922fe6716a1ccfef316b1a7217a0f9

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Pre-order.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4808

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4808-2-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB

  • memory/4808-3-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB

  • memory/4808-4-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB

  • memory/4808-5-0x00007FFA60FD0000-0x00007FFA61607000-memory.dmp
    Filesize

    6.2MB

  • memory/4808-6-0x00007FFA3D590000-0x00007FFA3D5A0000-memory.dmp
    Filesize

    64KB