Analysis
-
max time kernel
101s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 08:01
Static task
static1
Behavioral task
behavioral1
Sample
a71661396c91a367f862cf2486dbf601cce5ac023be38a7b258e3fb86f96f848.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a71661396c91a367f862cf2486dbf601cce5ac023be38a7b258e3fb86f96f848.xlsx
Resource
win10v2004-20220812-en
General
-
Target
a71661396c91a367f862cf2486dbf601cce5ac023be38a7b258e3fb86f96f848.xlsx
-
Size
10KB
-
MD5
14041fbd811c50193d969cf0c91bc3ce
-
SHA1
88676eaa26004fb1deb943f1fd1ce4092049b0c8
-
SHA256
a71661396c91a367f862cf2486dbf601cce5ac023be38a7b258e3fb86f96f848
-
SHA512
f718a1d01ac920a1ee8dc682803b804014a1f1eea8f69c5c2647e8ed9a818588d0f1106c78c9d6c950f5f97e378bfe4f9c30b0d47388e1377bb8d47266ad1b0b
-
SSDEEP
192:pMmBOkdrIl8ybLJP3o/JjEtXtxVFe4G3C7ayM29Ce/HLDRUj8nJvy9x:Kmot2kow/7gzR4DD1JvCx
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5048 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE 5048 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a71661396c91a367f862cf2486dbf601cce5ac023be38a7b258e3fb86f96f848.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:5048