Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-09-2022 18:22
Static task
static1
Behavioral task
behavioral1
Sample
ERPAgf[^x[X`.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ERPAgf[^x[X`.xls
Resource
win10v2004-20220812-en
General
-
Target
ERPAgf[^x[X`.xls
-
Size
154KB
-
MD5
7d1838f48b5dc23277d7d3afd47a7232
-
SHA1
7130a0ed32b7f89dac5a04595d19feef119e67dc
-
SHA256
4063931707563e3691e2001e255ff560f8263d257ea5dde703572f78ebcf8cee
-
SHA512
5e84dacf09925cfd733158e41a619c00c70facacf4ec306d065c67dda83bc446790780018d60d86a5a0f422949674815a246f84f274351ec1c0187cd07764cfb
-
SSDEEP
3072:wle9nhPj8noKKgOf0jDSVFhv5AbRQZj0eD8dY9+U6/hJ6odrms+yuNqwFium8f:Ue9nhPj8noKKgOf0jDSVFhxAbRQZj0eN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3412 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE 3412 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ERPAgf[^x[X`.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3412