Analysis

  • max time kernel
    100s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    10-05-2021 06:31

General

  • Target

    SOA May.xlt

  • Size

    708KB

  • MD5

    eab9dd0c6c9970b12851dc56c8e77ebb

  • SHA1

    0ce87f1116fe287bc9415a051af23c81d27449c1

  • SHA256

    1c409fee36dda5337ef340dd480d92fbf68da68bee2a28f267def6bbb63755f6

  • SHA512

    fc619429f3ff49df839345f754ada67b35960c015b0be84289ae9aad8174142f4b6bce067bcb7babefd6aac65399806c528417329eb3dc1c87f0073e08bdb4cb

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SOA May.xlt"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3916

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3916-114-0x00007FF754480000-0x00007FF757A36000-memory.dmp
    Filesize

    53.7MB

  • memory/3916-115-0x00007FFB4C800000-0x00007FFB4C810000-memory.dmp
    Filesize

    64KB

  • memory/3916-116-0x00007FFB4C800000-0x00007FFB4C810000-memory.dmp
    Filesize

    64KB

  • memory/3916-117-0x00007FFB4C800000-0x00007FFB4C810000-memory.dmp
    Filesize

    64KB

  • memory/3916-118-0x00007FFB4C800000-0x00007FFB4C810000-memory.dmp
    Filesize

    64KB

  • memory/3916-121-0x00007FFB4C800000-0x00007FFB4C810000-memory.dmp
    Filesize

    64KB

  • memory/3916-122-0x00007FFB6C980000-0x00007FFB6DA6E000-memory.dmp
    Filesize

    16.9MB

  • memory/3916-123-0x00007FFB6AA80000-0x00007FFB6C975000-memory.dmp
    Filesize

    31.0MB