Analysis

  • max time kernel
    130s
  • max time network
    134s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    20-01-2022 12:11

General

  • Target

    HIJN_22991.xlsx

  • Size

    115KB

  • MD5

    12f7a6aa0a09e355bd70c8291ae682e2

  • SHA1

    ea7943806f839e871bb5c957d64850ca66118577

  • SHA256

    92f01f34d0d3d902538fa84268d937ddcbfb4e40234b4a97b1b50a227a002f1a

  • SHA512

    df6ee800f9bf4b2e9a60b8a371031410416992b4b1806900fdfc4d399e5c5cdf5efc53d62ce3f8549bdbe3e88e20f4c4cf6662d8b826d4c0cb082a53d0afb2a4

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\HIJN_22991.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:844
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
    1⤵
      PID:804

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/844-130-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-131-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-132-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-134-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-133-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-137-0x00007FF8A4630000-0x00007FF8A4640000-memory.dmp

      Filesize

      64KB

    • memory/844-138-0x00007FF8A4630000-0x00007FF8A4640000-memory.dmp

      Filesize

      64KB

    • memory/844-165-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-166-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-167-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB

    • memory/844-168-0x00007FF8A6690000-0x00007FF8A66A0000-memory.dmp

      Filesize

      64KB