Analysis

  • max time kernel
    101s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    04-07-2022 07:38

General

  • Target

    PO 7422.xlsx

  • Size

    177KB

  • MD5

    4b6244a1bfb04a6e70126f14496df159

  • SHA1

    64cb1626e363a7aca0158f853fa6aeae6c9ed334

  • SHA256

    2dadabbf7599c51d7fb332314c39ef18d8a2d229f66967402f4870bf97dc1a65

  • SHA512

    cec3b56bd95ef86fc9445ca013d2f349680df04108b62ff01381bfe976bd85237e195890425985f7aeef17d15b423794f497e9f9261d263f149225a1f5fb1f76

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO 7422.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3376

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3376-130-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-131-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-132-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-133-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-134-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-135-0x00007FFC8D0F0000-0x00007FFC8D100000-memory.dmp
    Filesize

    64KB

  • memory/3376-136-0x00007FFC8D0F0000-0x00007FFC8D100000-memory.dmp
    Filesize

    64KB

  • memory/3376-138-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-139-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-140-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB

  • memory/3376-141-0x00007FFC8F810000-0x00007FFC8F820000-memory.dmp
    Filesize

    64KB