Resubmissions

06-07-2022 05:52

220706-gkqtcabdd6 1

06-07-2022 05:49

220706-gh8w5sheak 10

06-07-2022 04:21

220706-eyraxsafd7 1

Analysis

  • max time kernel
    199s
  • max time network
    202s
  • platform
    windows10_x64
  • resource
    win10-20220414-en
  • submitted
    06-07-2022 05:52

General

  • Target

    RFP20220707DX1.xlsx

  • Size

    176KB

  • MD5

    56216ff6352da0391772dbfcc6048c60

  • SHA1

    1f25f87f68748566062820ec293f7c1678d301ce

  • SHA256

    82e7f3f4e817a291abb29ae2698c1242d3d53f39a37f1530d4210573f26fade9

  • SHA512

    e9fd9b0b7f82889d7e81cb29d9dfbf5832f32e909f79209dd594631292622972728dcf898d875d42f47554071b0b12fba6486eeabc668f716ea84f92790c3de2

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 23 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFP20220707DX1.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2796

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2796-114-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-115-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-116-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-117-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-126-0x00007FFA3B300000-0x00007FFA3B310000-memory.dmp

    Filesize

    64KB

  • memory/2796-127-0x00007FFA3B300000-0x00007FFA3B310000-memory.dmp

    Filesize

    64KB

  • memory/2796-334-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-335-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-337-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB

  • memory/2796-336-0x00007FFA3E5B0000-0x00007FFA3E5C0000-memory.dmp

    Filesize

    64KB