Analysis
-
max time kernel
136s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
23-03-2022 02:37
Static task
static1
Behavioral task
behavioral1
Sample
이력서.xll
Resource
win7-20220311-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
이력서.xll
Resource
win10v2004-en-20220113
0 signatures
0 seconds
General
-
Target
이력서.xll
-
Size
667KB
-
MD5
c181e7eaacbcfe010375a857460a76c6
-
SHA1
eccc90dfd24abcebc0d20b733e4ec0c713be3763
-
SHA256
549cf5de7d7221009f46b148b59dc529de794d2dfd70b81ef3717c25a3de5360
-
SHA512
1d007f214e3b6644492e1dbfc87df331d62df74c45b168875a6da5a5730c694c1407b8bdf65a6a06ee729db996141acb02977c5e5c1eaebe6815385f2ace9f2a
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1948 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1948 EXCEL.EXE 1948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE 1948 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\이력서.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1948