Analysis

  • max time kernel
    111s
  • max time network
    127s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    13-12-2021 15:12

General

  • Target

    GE00006892.xlsx

  • Size

    820KB

  • MD5

    567248278e09cf6968be5471122aa38a

  • SHA1

    32220dfb875eb221eb1a33ae77e43cc08e07748f

  • SHA256

    630cda95d9be61fb7bd3bddc4aacde78cc7c5a92dc303e0b354a2f81e2c4a855

  • SHA512

    66093e80a786043762da533c30f882e5894397945f3a418b4da30949ac95faf1e5daf4bb79dc7d59837366f844daa0a808b6c67f042df3e757251ec474975964

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\GE00006892.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3792

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3792-118-0x00007FFD467F0000-0x00007FFD46800000-memory.dmp
    Filesize

    64KB

  • memory/3792-119-0x00007FFD467F0000-0x00007FFD46800000-memory.dmp
    Filesize

    64KB

  • memory/3792-120-0x00007FFD467F0000-0x00007FFD46800000-memory.dmp
    Filesize

    64KB

  • memory/3792-121-0x00007FFD467F0000-0x00007FFD46800000-memory.dmp
    Filesize

    64KB

  • memory/3792-122-0x000001AAE3060000-0x000001AAE3062000-memory.dmp
    Filesize

    8KB

  • memory/3792-123-0x000001AAE3060000-0x000001AAE3062000-memory.dmp
    Filesize

    8KB

  • memory/3792-124-0x000001AAE3060000-0x000001AAE3062000-memory.dmp
    Filesize

    8KB

  • memory/3792-130-0x00007FFD467F0000-0x00007FFD46800000-memory.dmp
    Filesize

    64KB