Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
15-12-2021 15:14
Static task
static1
Behavioral task
behavioral1
Sample
tmp/c90047524c263f981bc16f205e841459673cbfe1f6ddc6cd34311e4d7311bece.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
tmp/c90047524c263f981bc16f205e841459673cbfe1f6ddc6cd34311e4d7311bece.xls
Resource
win10-en-20211208
General
-
Target
tmp/c90047524c263f981bc16f205e841459673cbfe1f6ddc6cd34311e4d7311bece.xls
-
Size
317KB
-
MD5
07d13657969c09576cbb79a1f60fafad
-
SHA1
cebdc7cc8cbbdc4ab7b20b77e4ddc65c90dae98c
-
SHA256
c90047524c263f981bc16f205e841459673cbfe1f6ddc6cd34311e4d7311bece
-
SHA512
dcd6b0fc4deab554bd27fd81fa0fc2a1c88c805a452a49b7d5f42905830e2a6454956857dc21b6469db2e2bffba00a842df6ef830fbcfb2754e9073fef7326a3
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2656 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE 2656 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\tmp\c90047524c263f981bc16f205e841459673cbfe1f6ddc6cd34311e4d7311bece.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2656-115-0x00007FFE79D20000-0x00007FFE79D30000-memory.dmpFilesize
64KB
-
memory/2656-116-0x00007FFE79D20000-0x00007FFE79D30000-memory.dmpFilesize
64KB
-
memory/2656-117-0x00007FFE79D20000-0x00007FFE79D30000-memory.dmpFilesize
64KB
-
memory/2656-118-0x00007FFE79D20000-0x00007FFE79D30000-memory.dmpFilesize
64KB
-
memory/2656-119-0x0000020A7F280000-0x0000020A7F282000-memory.dmpFilesize
8KB
-
memory/2656-120-0x0000020A7F280000-0x0000020A7F282000-memory.dmpFilesize
8KB
-
memory/2656-121-0x0000020A7F280000-0x0000020A7F282000-memory.dmpFilesize
8KB
-
memory/2656-127-0x00007FFE79D20000-0x00007FFE79D30000-memory.dmpFilesize
64KB