Analysis
-
max time kernel
144s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/05/2022, 16:27
Behavioral task
behavioral1
Sample
?i=1eeqzmxdl.xls
Resource
win7-20220414-en
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
?i=1eeqzmxdl.xls
Resource
win10v2004-20220414-en
0 signatures
0 seconds
General
-
Target
?i=1eeqzmxdl.xls
-
Size
113KB
-
MD5
3e47f75fb9dbb067e2b47049666fc1d2
-
SHA1
df51ed9b3c9bc6bbef920f2de3bedeccda5217c3
-
SHA256
aa65a34067b0c50e89c1078d0c7ff08de43e5036241404574f846265de6ff6bd
-
SHA512
878839b9037053905384417e505741ef74622804eb384f84d1cd1b8b96eb8b0521d6f248f5a9ae635c2367cab17669db248156ef0ca5f11d6a54f3adc0d118eb
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/
xlm40.dropper
http://old.liceum9.ru/images/0/
xlm40.dropper
http://ostadsarma.com/wp-admin/pYk64Hh3z5hjnMziZ/
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2932 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE 2932 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\_i=1eeqzmxdl.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2932