Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11/01/2022, 17:15
Behavioral task
behavioral1
Sample
e99c27037595f4931d753f7e372cbad60953e56c327d9ea2a2c3042db0f5f4e4.xls
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
e99c27037595f4931d753f7e372cbad60953e56c327d9ea2a2c3042db0f5f4e4.xls
Resource
win10-en-20211208
General
-
Target
e99c27037595f4931d753f7e372cbad60953e56c327d9ea2a2c3042db0f5f4e4.xls
-
Size
113KB
-
MD5
da933906dd6b43244cfa5836f0b43e9b
-
SHA1
da5c28e9da7d1ed0857e446dcdacbae78f0cdb53
-
SHA256
e99c27037595f4931d753f7e372cbad60953e56c327d9ea2a2c3042db0f5f4e4
-
SHA512
b7ac20412f3279c4041993b36ce67377d818752c01f2a08be43e6340947f225f28f125f3228473d93aac4c554f5ccb6261a8caae382a3696a4bf00e20be4178a
Malware Config
Extracted
http://gaidov.bg/wp-includes/Ug/
http://studiokrishnaproduction.com/wp-includes/3mJ/
http://goodmarketinggroup.com/live_site/Y9cEk9QNlDUeg/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4000 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4000 EXCEL.EXE 4000 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4000 EXCEL.EXE 4000 EXCEL.EXE 4000 EXCEL.EXE 4000 EXCEL.EXE 4000 EXCEL.EXE 4000 EXCEL.EXE 4000 EXCEL.EXE 4000 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e99c27037595f4931d753f7e372cbad60953e56c327d9ea2a2c3042db0f5f4e4.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4000