Analysis

  • max time kernel
    141s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    07-05-2021 15:17

General

  • Target

    copy of check 542554.xlsm

  • Size

    51KB

  • MD5

    2610e5f9526bbf2171f07e3bd9989b10

  • SHA1

    7764c634cd888c489323f37788311b11a3a9e280

  • SHA256

    d04d9ff88c4f951deb7c1a12636fa582ae3747d79d516420d2ca871a77a1dca0

  • SHA512

    ec64b9c31ec80b7ecef441d70281135866ca105be75fe356a6fc3338dffb3f54a342a9ebc41448021de495020b9d236c4a78def31023aa7051e969ca2f0bf864

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\copy of check 542554.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4460

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4460-114-0x00007FF78A500000-0x00007FF78DAB6000-memory.dmp
    Filesize

    53.7MB

  • memory/4460-115-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmp
    Filesize

    64KB

  • memory/4460-116-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmp
    Filesize

    64KB

  • memory/4460-117-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmp
    Filesize

    64KB

  • memory/4460-118-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmp
    Filesize

    64KB

  • memory/4460-121-0x00007FF9D40C0000-0x00007FF9D51AE000-memory.dmp
    Filesize

    16.9MB

  • memory/4460-122-0x00007FF9B3A10000-0x00007FF9B3A20000-memory.dmp
    Filesize

    64KB

  • memory/4460-123-0x00000145C5C10000-0x00000145C7B05000-memory.dmp
    Filesize

    31.0MB

  • memory/4460-179-0x00000145D9540000-0x00000145D9544000-memory.dmp
    Filesize

    16KB