Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
13-10-2021 15:41
Behavioral task
behavioral1
Sample
Invoice-64145512_20211013.xlsb
Resource
win7v20210408
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-64145512_20211013.xlsb
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-64145512_20211013.xlsb
-
Size
269KB
-
MD5
4e6d8b34d4441d66984a1b4fa51fe561
-
SHA1
a991079981a98f9cf3ceba151ce56d39fa522b5d
-
SHA256
6a5cd724baaebc19773830980de192cfa10e9d921469153399e656fbdd0ff972
-
SHA512
a934d862c117c7010b17473fe6c9d71824f43a95fe48e7bf93ce5505142a8dd29b5aacc9dc75bf7257571e494ae6b39e6ec399f9efa0e9dbb99722bcaa080804
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 396 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE 396 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-64145512_20211013.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/396-114-0x00007FFF79C30000-0x00007FFF79C40000-memory.dmpFilesize
64KB
-
memory/396-115-0x00007FFF79C30000-0x00007FFF79C40000-memory.dmpFilesize
64KB
-
memory/396-116-0x00007FFF79C30000-0x00007FFF79C40000-memory.dmpFilesize
64KB
-
memory/396-117-0x00007FFF79C30000-0x00007FFF79C40000-memory.dmpFilesize
64KB
-
memory/396-118-0x00007FFF79C30000-0x00007FFF79C40000-memory.dmpFilesize
64KB
-
memory/396-120-0x00000251CF200000-0x00000251CF202000-memory.dmpFilesize
8KB
-
memory/396-119-0x00000251CF200000-0x00000251CF202000-memory.dmpFilesize
8KB
-
memory/396-121-0x00000251CF200000-0x00000251CF202000-memory.dmpFilesize
8KB