Analysis
-
max time kernel
103s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
18-10-2021 20:11
Behavioral task
behavioral1
Sample
Invoice-7582_20211013.xlsb
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-7582_20211013.xlsb
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-7582_20211013.xlsb
-
Size
215KB
-
MD5
dcda575dc608ed88cfd2b903b8acd7b8
-
SHA1
5350523aaafb703a3cd1f75800c5c469af6e7bf6
-
SHA256
34308f03d102d65cfe10fd50604c3cbff4bd3ebbe93437a3afa1c73ea2b2f0ea
-
SHA512
849598052abe64382217af55f8b6d341743982c6f975f074545c17a6b6b325281bdd362170619739ef9e6a0012cd4ad4e617d18b0a33b01c89f31f00ad4c642e
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1380 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE 1380 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-7582_20211013.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1380-115-0x00007FF93D1D0000-0x00007FF93D1E0000-memory.dmpFilesize
64KB
-
memory/1380-116-0x00007FF93D1D0000-0x00007FF93D1E0000-memory.dmpFilesize
64KB
-
memory/1380-117-0x00007FF93D1D0000-0x00007FF93D1E0000-memory.dmpFilesize
64KB
-
memory/1380-118-0x00007FF93D1D0000-0x00007FF93D1E0000-memory.dmpFilesize
64KB
-
memory/1380-120-0x0000029F81BE0000-0x0000029F81BE2000-memory.dmpFilesize
8KB
-
memory/1380-119-0x0000029F81BE0000-0x0000029F81BE2000-memory.dmpFilesize
8KB
-
memory/1380-121-0x00007FF93D1D0000-0x00007FF93D1E0000-memory.dmpFilesize
64KB
-
memory/1380-122-0x0000029F81BE0000-0x0000029F81BE2000-memory.dmpFilesize
8KB