Analysis
-
max time kernel
268s -
max time network
313s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 16:18
Behavioral task
behavioral1
Sample
Invoice-619401385_20211021.xlsb
Resource
win7-en-20211014
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-619401385_20211021.xlsb
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-619401385_20211021.xlsb
-
Size
242KB
-
MD5
bd72bbf56fe20c6d617592b34a811ec2
-
SHA1
841fb8268ceb0fadde341a3c91a3e380d54d3d0b
-
SHA256
1e92fde2a582256674c8528113695e810990fb4b48b84287e3bcaca224d6cc53
-
SHA512
bf8d060a91762f8e3570835f8ae096f9bdfe5edee80eb0d9b80e574cc3831ea9575d2728afeeaf812d9af157cfd3eddac14fbb20754599e0fee1e208ab084d09
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4068 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE 4068 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-619401385_20211021.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4068-115-0x00007FF937A30000-0x00007FF937A40000-memory.dmpFilesize
64KB
-
memory/4068-116-0x00007FF937A30000-0x00007FF937A40000-memory.dmpFilesize
64KB
-
memory/4068-117-0x00007FF937A30000-0x00007FF937A40000-memory.dmpFilesize
64KB
-
memory/4068-118-0x00007FF937A30000-0x00007FF937A40000-memory.dmpFilesize
64KB
-
memory/4068-119-0x000001FF44350000-0x000001FF44352000-memory.dmpFilesize
8KB
-
memory/4068-120-0x000001FF44350000-0x000001FF44352000-memory.dmpFilesize
8KB
-
memory/4068-121-0x00007FF937A30000-0x00007FF937A40000-memory.dmpFilesize
64KB
-
memory/4068-122-0x000001FF44350000-0x000001FF44352000-memory.dmpFilesize
8KB
-
memory/4068-128-0x00007FF934D50000-0x00007FF934D60000-memory.dmpFilesize
64KB
-
memory/4068-129-0x00007FF934D50000-0x00007FF934D60000-memory.dmpFilesize
64KB
-
memory/4068-174-0x000001FF44350000-0x000001FF44352000-memory.dmpFilesize
8KB
-
memory/4068-175-0x000001FF44350000-0x000001FF44352000-memory.dmpFilesize
8KB