Analysis

  • max time kernel
    104s
  • max time network
    138s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    19-10-2021 14:44

General

  • Target

    New PO.xlsx

  • Size

    369KB

  • MD5

    e883ef4023d37cee1dfb1f9931d2fe37

  • SHA1

    bc0810d04f38a3dd153c5d9faaec63f93f85ddd2

  • SHA256

    4d0e73e1fa9440b0fdbb6b73901fd8ecc618600b2cfe4a07cfb8f6696a1199e0

  • SHA512

    7e85bb566f5c86bc0b6c7b506ea75fc54e33cdecb02faad5a7c3218053c63cb8de2326e99dcc1e4a21980d385e55dcb582e13ccb004dcf61151835759e67154c

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\New PO.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1336

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1336-115-0x00007FFCA8250000-0x00007FFCA8260000-memory.dmp
    Filesize

    64KB

  • memory/1336-116-0x00007FFCA8250000-0x00007FFCA8260000-memory.dmp
    Filesize

    64KB

  • memory/1336-117-0x00007FFCA8250000-0x00007FFCA8260000-memory.dmp
    Filesize

    64KB

  • memory/1336-118-0x00007FFCA8250000-0x00007FFCA8260000-memory.dmp
    Filesize

    64KB

  • memory/1336-120-0x000001ADB5CE0000-0x000001ADB5CE2000-memory.dmp
    Filesize

    8KB

  • memory/1336-119-0x000001ADB5CE0000-0x000001ADB5CE2000-memory.dmp
    Filesize

    8KB

  • memory/1336-121-0x00007FFCA8250000-0x00007FFCA8260000-memory.dmp
    Filesize

    64KB

  • memory/1336-122-0x000001ADB5CE0000-0x000001ADB5CE2000-memory.dmp
    Filesize

    8KB