Analysis

  • max time kernel
    119s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    05-07-2022 12:18

General

  • Target

    RFP 20220707DX1.xlsx

  • Size

    176KB

  • MD5

    56216ff6352da0391772dbfcc6048c60

  • SHA1

    1f25f87f68748566062820ec293f7c1678d301ce

  • SHA256

    82e7f3f4e817a291abb29ae2698c1242d3d53f39a37f1530d4210573f26fade9

  • SHA512

    e9fd9b0b7f82889d7e81cb29d9dfbf5832f32e909f79209dd594631292622972728dcf898d875d42f47554071b0b12fba6486eeabc668f716ea84f92790c3de2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFP 20220707DX1.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4772

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4772-130-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-131-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-132-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-133-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-134-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-135-0x00007FFAB92B0000-0x00007FFAB92C0000-memory.dmp
    Filesize

    64KB

  • memory/4772-136-0x00007FFAB92B0000-0x00007FFAB92C0000-memory.dmp
    Filesize

    64KB

  • memory/4772-138-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-139-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-140-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB

  • memory/4772-141-0x00007FFABBC10000-0x00007FFABBC20000-memory.dmp
    Filesize

    64KB