Analysis
-
max time kernel
150s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 08:28
Behavioral task
behavioral1
Sample
Invoice-50038584_20211020.xlsb
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-50038584_20211020.xlsb
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-50038584_20211020.xlsb
-
Size
167KB
-
MD5
5b3f012ec3213e5ad74a6b6621c0ac11
-
SHA1
07c224c9720cf9ad19b7923202ef5d4dba95c367
-
SHA256
8df6b641eb89af06cba81097f8e98a1de5648524fba678d34e5ca849de41d1de
-
SHA512
ec58bd8401e8a563ceda0e353776266357dc64f4f344df8e4429e54ec3d1b6020fc35f37f0ad127d4ad839741586d2d0c147c60e83f7afff03348108c9949e16
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4068 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
Processes:
EXCEL.EXEpid process 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-50038584_20211020.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4068-115-0x00007FFD98900000-0x00007FFD98910000-memory.dmpFilesize
64KB
-
memory/4068-116-0x00007FFD98900000-0x00007FFD98910000-memory.dmpFilesize
64KB
-
memory/4068-117-0x00007FFD98900000-0x00007FFD98910000-memory.dmpFilesize
64KB
-
memory/4068-118-0x00007FFD98900000-0x00007FFD98910000-memory.dmpFilesize
64KB
-
memory/4068-119-0x0000018D91CB0000-0x0000018D91CB2000-memory.dmpFilesize
8KB
-
memory/4068-120-0x0000018D91CB0000-0x0000018D91CB2000-memory.dmpFilesize
8KB
-
memory/4068-121-0x00007FFD98900000-0x00007FFD98910000-memory.dmpFilesize
64KB
-
memory/4068-122-0x0000018D91CB0000-0x0000018D91CB2000-memory.dmpFilesize
8KB
-
memory/4068-128-0x00007FFD95760000-0x00007FFD95770000-memory.dmpFilesize
64KB
-
memory/4068-129-0x00007FFD95760000-0x00007FFD95770000-memory.dmpFilesize
64KB