Analysis
-
max time kernel
119s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211014 -
submitted
20-10-2021 21:05
Behavioral task
behavioral1
Sample
Invoice-17356799_20211013.xlsb
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-17356799_20211013.xlsb
Resource
win10-en-20211014
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-17356799_20211013.xlsb
-
Size
178KB
-
MD5
f423f4b84a5510642943224a5fe656df
-
SHA1
65ed12cca2ef26d4971ed909e59960b731cd7799
-
SHA256
46561cf375b86ed86e06bc964e5a8faed7c5638dc1feaa7f7723ee985b7f4810
-
SHA512
aea4bf3cfdd9250c88d96969188a34553a5a8405650327091bb05fad65debd448a18eafb7cfda713bb07f6963c8338ddd90ce659f7a857df3f895c7f983d1bb0
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1672 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE 1672 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-17356799_20211013.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1672-115-0x00007FFEA4190000-0x00007FFEA41A0000-memory.dmpFilesize
64KB
-
memory/1672-116-0x00007FFEA4190000-0x00007FFEA41A0000-memory.dmpFilesize
64KB
-
memory/1672-117-0x00007FFEA4190000-0x00007FFEA41A0000-memory.dmpFilesize
64KB
-
memory/1672-118-0x00007FFEA4190000-0x00007FFEA41A0000-memory.dmpFilesize
64KB
-
memory/1672-119-0x00007FFEA4190000-0x00007FFEA41A0000-memory.dmpFilesize
64KB
-
memory/1672-120-0x000001D6DF770000-0x000001D6DF772000-memory.dmpFilesize
8KB
-
memory/1672-121-0x000001D6DF770000-0x000001D6DF772000-memory.dmpFilesize
8KB
-
memory/1672-122-0x000001D6DF770000-0x000001D6DF772000-memory.dmpFilesize
8KB