Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2022, 06:48
Static task
static1
Behavioral task
behavioral1
Sample
Draft Shipping Documents.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Draft Shipping Documents.xlsx
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
decrypted.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
decrypted.xlsx
Resource
win10v2004-20220812-en
General
-
Target
decrypted.xlsx
-
Size
168KB
-
MD5
87e3f760a097da0b619eaceed22711be
-
SHA1
64531de7c4f972aab768148ae594e0af1e8bba0f
-
SHA256
be76eba33a9eef60c5dc5bcf85dd024a319bb3415248d50cfd7dce41a3b0e9ff
-
SHA512
c89e1b5f28ba2c0bba43373cd295d961cbc27aba133baaae38eddd268972a6aac75f7957fa3032f81907a5d2b4b53a49245507ea44dbb894c2931636895332f1
-
SSDEEP
3072:YM8TlAbQh12ZOhivfWh05bQReF8a5YQZFlBApeknaJSGUqiszMKp4114HkSwO:YM8TVlh0ceFXRBBknad/+TRFO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4844 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE 4844 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\decrypted.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4844