Analysis

  • max time kernel
    164s
  • max time network
    249s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-10-2021 15:31

General

  • Target

    Payment.CA4GY0.xlsb

  • Size

    255KB

  • MD5

    f233c90b2a5964be246baa4c5daded3f

  • SHA1

    d1619666d51b483ac2736e2483ed35016ab98ad8

  • SHA256

    885b0aad6a8cdc2d7c9f02d1f76374d8c345eb32a2ce04ecef7fbf65abb75791

  • SHA512

    96cb099703e190755e523b32cf99929f39f79fc3bdae8409cfe7eda8db3c3abe29fbd1e32941117a3901b86ee3ebc133d5eb432ce0fdb9ba6abb56386414d829

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment.CA4GY0.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:996

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/996-114-0x00007FF861870000-0x00007FF861880000-memory.dmp
    Filesize

    64KB

  • memory/996-115-0x00007FF861870000-0x00007FF861880000-memory.dmp
    Filesize

    64KB

  • memory/996-116-0x00007FF861870000-0x00007FF861880000-memory.dmp
    Filesize

    64KB

  • memory/996-117-0x00007FF861870000-0x00007FF861880000-memory.dmp
    Filesize

    64KB

  • memory/996-118-0x00007FF861870000-0x00007FF861880000-memory.dmp
    Filesize

    64KB

  • memory/996-120-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-119-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-121-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-129-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-130-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-142-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-143-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-144-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-145-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-149-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-148-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-153-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-154-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB

  • memory/996-178-0x000001CEE3A70000-0x000001CEE3A72000-memory.dmp
    Filesize

    8KB