Analysis
-
max time kernel
108s -
max time network
137s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
18-10-2021 21:11
Behavioral task
behavioral1
Sample
Invoice-735832084_20211013.xlsb
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-735832084_20211013.xlsb
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-735832084_20211013.xlsb
-
Size
213KB
-
MD5
16927c678055767a59f6b511e1ce6658
-
SHA1
d697082e478814cdcc99cfa942afcd319c0225fc
-
SHA256
aa4ef957f1635a0fa6e666dd322abe1e95f634a63755bee3f10045e1fc55ea33
-
SHA512
d445bceb74c01087b763b87ea1881d2b81aa5fd64e8fdb384eef38d3180b2bf39bf793c39c04fff2e6df664cb7a66994bb7434e814e84f2287f59d52ff653735
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 392 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-735832084_20211013.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/392-115-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmpFilesize
64KB
-
memory/392-116-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmpFilesize
64KB
-
memory/392-117-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmpFilesize
64KB
-
memory/392-118-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmpFilesize
64KB
-
memory/392-119-0x000001A955AF0000-0x000001A955AF2000-memory.dmpFilesize
8KB
-
memory/392-120-0x000001A955AF0000-0x000001A955AF2000-memory.dmpFilesize
8KB
-
memory/392-121-0x000001A955AF0000-0x000001A955AF2000-memory.dmpFilesize
8KB
-
memory/392-127-0x00007FFB8C970000-0x00007FFB8C980000-memory.dmpFilesize
64KB