Resubmissions
21-10-2021 20:24
211021-y61dcaaga2 1021-10-2021 17:34
211021-v5sekabdhk 821-10-2021 17:31
211021-v34d2sbdgr 821-10-2021 17:06
211021-vmt6faaef2 10Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
21-10-2021 17:34
Behavioral task
behavioral1
Sample
Invoice-343244_20211021.xlsb
Resource
win7-en-20210920
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Invoice-343244_20211021.xlsb
Resource
win10-en-20210920
windows10_x64
0 signatures
0 seconds
General
-
Target
Invoice-343244_20211021.xlsb
-
Size
243KB
-
MD5
3196a0b77b44ba792558614a4aa236a1
-
SHA1
3110961e72744c54c4129291dc1a3d39d4b0b3e6
-
SHA256
37ce585f1134a397310c7f79b87be04eb0ce7b6c162f3e6523db5c0b7cd3f57d
-
SHA512
52df9c0de8fff1f22d696ed3a72fcf1166587b944815de74b6d0b397b488c6182fbf69211efdb5f870064f61ee5899432d0c72667b7a2432729ac7afa7cf1b58
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2796 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE 2796 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-343244_20211021.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2796-115-0x00007FFF78EE0000-0x00007FFF78EF0000-memory.dmpFilesize
64KB
-
memory/2796-116-0x00007FFF78EE0000-0x00007FFF78EF0000-memory.dmpFilesize
64KB
-
memory/2796-117-0x00007FFF78EE0000-0x00007FFF78EF0000-memory.dmpFilesize
64KB
-
memory/2796-118-0x00007FFF78EE0000-0x00007FFF78EF0000-memory.dmpFilesize
64KB
-
memory/2796-119-0x0000028D09BE0000-0x0000028D09BE2000-memory.dmpFilesize
8KB
-
memory/2796-120-0x0000028D09BE0000-0x0000028D09BE2000-memory.dmpFilesize
8KB
-
memory/2796-121-0x0000028D09BE0000-0x0000028D09BE2000-memory.dmpFilesize
8KB
-
memory/2796-127-0x00007FFF78EE0000-0x00007FFF78EF0000-memory.dmpFilesize
64KB