Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    09-12-2021 09:34

General

  • Target

    tmp/89f4f79ac4d11f9d5edc1db5526dbc6705c528b3a48d7c103906be084bf91b23.xls

  • Size

    229KB

  • MD5

    cacad265519e30042811c7a30dcda471

  • SHA1

    b82bafb6fbf9d10439bdfa9282df77aa6bfc9fdc

  • SHA256

    89f4f79ac4d11f9d5edc1db5526dbc6705c528b3a48d7c103906be084bf91b23

  • SHA512

    f29d90114eed77e4b0cf4753d2302e419b156161ea02812c29c78a102a443c07d0b6e9fba227439f44bc87473e601ccd5f768ec9629e8de985f0281e21745658

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\tmp\89f4f79ac4d11f9d5edc1db5526dbc6705c528b3a48d7c103906be084bf91b23.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3832

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3832-115-0x00007FFEF3A30000-0x00007FFEF3A40000-memory.dmp
    Filesize

    64KB

  • memory/3832-116-0x00007FFEF3A30000-0x00007FFEF3A40000-memory.dmp
    Filesize

    64KB

  • memory/3832-117-0x00007FFEF3A30000-0x00007FFEF3A40000-memory.dmp
    Filesize

    64KB

  • memory/3832-118-0x00007FFEF3A30000-0x00007FFEF3A40000-memory.dmp
    Filesize

    64KB

  • memory/3832-119-0x00007FFEF3A30000-0x00007FFEF3A40000-memory.dmp
    Filesize

    64KB

  • memory/3832-121-0x000002181D380000-0x000002181D382000-memory.dmp
    Filesize

    8KB

  • memory/3832-120-0x000002181D380000-0x000002181D382000-memory.dmp
    Filesize

    8KB

  • memory/3832-122-0x000002181D380000-0x000002181D382000-memory.dmp
    Filesize

    8KB