Analysis
-
max time kernel
258s -
max time network
217s -
platform
windows10-2004_x64 -
resource
win10v2004-20220310-en -
submitted
16-03-2022 08:41
Static task
static1
Behavioral task
behavioral1
Sample
PO 121873.xlsx
Resource
win7-20220311-en
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO 121873.xlsx
Resource
win10v2004-20220310-en
windows10-2004_x64
0 signatures
0 seconds
General
-
Target
PO 121873.xlsx
-
Size
713KB
-
MD5
9f2cf851a66d5ec3520dab2364619890
-
SHA1
cf6184531e30b05d1e5565d4626441c757240aa5
-
SHA256
2f5b78358322f5fd8c560d8a223282016decea4d3f74f5145283d3f1ec764ebc
-
SHA512
1da16064e04dcddd44e49cb4973a407c9502dbbe23d3247322c3114329994799219c7244bd4876bf9f89b1fe3cc7d6366704cb944e30bf56b5b6e6d7bf19230b
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE 1044 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO 121873.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1044