Analysis
-
max time kernel
123s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
15/09/2022, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
ͬ1.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ͬ1.xls
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
ͬ2.xls
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
ͬ2.xls
Resource
win10v2004-20220812-en
General
-
Target
ͬ1.xls
-
Size
10.0MB
-
MD5
d00ebccbab3ff55d164207fb92da7939
-
SHA1
e1efd70934e0294959c127c44119e14923872876
-
SHA256
9b5b640a9c74d0e1e1461f843eb558e9b29cf19b2c4fe307c83368a5cbf4e283
-
SHA512
4a41767ac65168052153442432602d2999cb4eb9fb4c6661578fda94e228c79ece8e8cdea6c4f6fd1638e094e75e1a6a1d99870b9ffb1e196d91bd33b3f60423
-
SSDEEP
3072:9KuGrL+MnNdNddWd5Lctv9A9Ry7yJMS4MZBT9uxUgi1cpcL5G3PyFHaBTOuFf4aX:9bG327ym34alUpF
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3680 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE 3680 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ͬ1.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3680