Analysis

  • max time kernel
    135s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    11-05-2021 12:14

General

  • Target

    PURCHASE ORDER 5112101.xlsx

  • Size

    1.4MB

  • MD5

    5c28a20ff81428e4038d11a4eca86729

  • SHA1

    8dd4efc4906f1227589515da1ce37f1a12f09e37

  • SHA256

    fdf00af2636a0e8756bb4f8eece1dfe360127c96030ce3f4bbb1484909333de0

  • SHA512

    ff727aab96c571b44d280b02b08bbe795d2623afd27982c7a3df2fb5c2b0d1edf7b84a8b69f365776e442cf58099beab879da532136fd7fd24033d7b7ee909e5

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 5112101.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1892

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1892-114-0x00007FF7FC300000-0x00007FF7FF8B6000-memory.dmp
    Filesize

    53.7MB

  • memory/1892-115-0x00007FF8CDBE0000-0x00007FF8CDBF0000-memory.dmp
    Filesize

    64KB

  • memory/1892-116-0x00007FF8CDBE0000-0x00007FF8CDBF0000-memory.dmp
    Filesize

    64KB

  • memory/1892-117-0x00007FF8CDBE0000-0x00007FF8CDBF0000-memory.dmp
    Filesize

    64KB

  • memory/1892-118-0x00007FF8CDBE0000-0x00007FF8CDBF0000-memory.dmp
    Filesize

    64KB

  • memory/1892-121-0x00007FF8CDBE0000-0x00007FF8CDBF0000-memory.dmp
    Filesize

    64KB

  • memory/1892-122-0x00007FF8EE8F0000-0x00007FF8EF9DE000-memory.dmp
    Filesize

    16.9MB

  • memory/1892-123-0x000001EB66F80000-0x000001EB68E75000-memory.dmp
    Filesize

    31.0MB