Analysis

  • max time kernel
    101s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    29-06-2022 07:53

General

  • Target

    tis.xlsx

  • Size

    163KB

  • MD5

    bfcb1b708667f051f3827417b0afd50c

  • SHA1

    95d69c432c2bc4bfa9e3bb5606343e6bc20bb8a3

  • SHA256

    41fa0a80e6b5b99e53343793ea3f8f1b2818d7012c7e82f71bad7b3f46fd632c

  • SHA512

    804b3fb392117f68b5a2b39c95ca1abe79d70c60c42400cf810253c7de5d112d1446c5906da3bb39835aa6d006b97ac768ef3f825d40edba03e60143552deeeb

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\tis.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3864

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3864-130-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-131-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-132-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-133-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-134-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-135-0x00007FFE0AC70000-0x00007FFE0AC80000-memory.dmp
    Filesize

    64KB

  • memory/3864-136-0x00007FFE0AC70000-0x00007FFE0AC80000-memory.dmp
    Filesize

    64KB

  • memory/3864-138-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-139-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-140-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB

  • memory/3864-141-0x00007FFE0D5D0000-0x00007FFE0D5E0000-memory.dmp
    Filesize

    64KB