Analysis

  • max time kernel
    68s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-05-2022 04:38

General

  • Target

    21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4.exe

  • Size

    616KB

  • MD5

    87e30ba93b9ebff6e00c0a802530e5fe

  • SHA1

    e54d3e6f3f7033b03db038a6ea43192e26c7792e

  • SHA256

    21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4

  • SHA512

    5471ca2af9c61913cd5449a9d49d275a4bcdcc042e109a66e077a57a989bdf9e7a153c6c9ba8837d03927e8177d4e66245f290b83f2c3dc92793f66e210c2bef

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4.exe
    "C:\Users\Admin\AppData\Local\Temp\21d376f0ec63236e590e58add44c00647588fdeb52b59f34efa43d5219520fb4.exe"
    1⤵
      PID:2688
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding
      1⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:4068

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4068-130-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-131-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-132-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-133-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-134-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-135-0x00007FFBD6660000-0x00007FFBD6670000-memory.dmp
      Filesize

      64KB

    • memory/4068-136-0x00007FFBD6660000-0x00007FFBD6670000-memory.dmp
      Filesize

      64KB

    • memory/4068-138-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-139-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-140-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB

    • memory/4068-141-0x00007FFBD8CF0000-0x00007FFBD8D00000-memory.dmp
      Filesize

      64KB