Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    07-07-2022 05:31

General

  • Target

    Payment Advice.xlsx

  • Size

    177KB

  • MD5

    a7f141d20c017dcfc0c0f953ab70849e

  • SHA1

    730dc699b2fc062385cb8642c9d32fa792aab3f3

  • SHA256

    a218f6790ee850c45bc013ffa81350ff30770d0d06d1d16e0bde8a093fd63969

  • SHA512

    5ad0d20ec9ffc2cf6e48067920d6f97cae4787ba8baf3f6a71218fe2be060d167bb20ce9ca822038409114eb688c70de864de7a7e9f687c4d80d477b7e31d2f4

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment Advice.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1976-130-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-131-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-132-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-133-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-134-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-135-0x00007FF871B70000-0x00007FF871B80000-memory.dmp

    Filesize

    64KB

  • memory/1976-136-0x00007FF871B70000-0x00007FF871B80000-memory.dmp

    Filesize

    64KB

  • memory/1976-138-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-139-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-140-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB

  • memory/1976-141-0x00007FF8740D0000-0x00007FF8740E0000-memory.dmp

    Filesize

    64KB