Analysis

  • max time kernel
    142s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220722-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2022 06:17

General

  • Target

    purchase order.xll

  • Size

    632KB

  • MD5

    07b9b4746d7d71fe1a670380a197a48f

  • SHA1

    902c5741347b1641280bd2670461391b46cfbafc

  • SHA256

    7da61c80129d3f314db26cdd16e8f2d956c538170001af5394a9d5b5687d69ea

  • SHA512

    03841fddcc314a1affe1ae2a5e7d486469d39f49c30fd62e21f443dddcd257a94f2c7b3b0dd0a49e44b2986beb3a6c88980299c8e0863f9d9a73d36f5a34a44b

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\purchase order.xll"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4516

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4516-132-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-134-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-133-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-135-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-136-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-137-0x00007FFB93B10000-0x00007FFB93B20000-memory.dmp

    Filesize

    64KB

  • memory/4516-138-0x00007FFB93B10000-0x00007FFB93B20000-memory.dmp

    Filesize

    64KB

  • memory/4516-140-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-141-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-142-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB

  • memory/4516-143-0x00007FFB95C10000-0x00007FFB95C20000-memory.dmp

    Filesize

    64KB