Analysis
-
max time kernel
156s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 05:22
Static task
static1
Behavioral task
behavioral1
Sample
6df11e5cbc78b1ac4c9db027e1b364f950312e0a6248e67a0ba25343c073468c.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
6df11e5cbc78b1ac4c9db027e1b364f950312e0a6248e67a0ba25343c073468c.xls
Resource
win10v2004-20220414-en
General
-
Target
6df11e5cbc78b1ac4c9db027e1b364f950312e0a6248e67a0ba25343c073468c.xls
-
Size
681KB
-
MD5
6bea544dc5be6b7181c751cc3a6a9f75
-
SHA1
5f7872bc1d1cdb55fdce5027d12e501a634ac169
-
SHA256
6df11e5cbc78b1ac4c9db027e1b364f950312e0a6248e67a0ba25343c073468c
-
SHA512
c5eb7aded6e8cbb92f8bc969ced6c67a3340af3f97beb7006c0ab59a808cbd2efa5a9ac4bf7c5ef159aabf9da6031bdb8cf379fb33c239e1441ce063a02da3ce
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{61F4FD13-9BF8-446A-BE88-906617B2537A}\4DCB66F5.tmp:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4948 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6df11e5cbc78b1ac4c9db027e1b364f950312e0a6248e67a0ba25343c073468c.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4948