Analysis
-
max time kernel
101s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
16/09/2022, 08:36
Static task
static1
Behavioral task
behavioral1
Sample
5c594835264fc80f0a51e06b0a05c089479176f0f1bec2513dcdd0b4282cac57.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5c594835264fc80f0a51e06b0a05c089479176f0f1bec2513dcdd0b4282cac57.xls
Resource
win10v2004-20220812-en
General
-
Target
5c594835264fc80f0a51e06b0a05c089479176f0f1bec2513dcdd0b4282cac57.xls
-
Size
46KB
-
MD5
d4162eb8f0722ee656f4247d906ed8bb
-
SHA1
f2c6f3cdd10407b8cee721f1eecdb7949503c3ff
-
SHA256
5c594835264fc80f0a51e06b0a05c089479176f0f1bec2513dcdd0b4282cac57
-
SHA512
d277d5a3c2947850df2473613a528b6362f6c4dbd40ed88d0443409a258d00dcf5c1a6b0d18f1bf36dd31db42b9cc67bc73e059ca68e1f783260c341a3b0dc29
-
SSDEEP
768:2SSSWS6CXDX0/dZBY4nI0jDSYAheaezAtcO9R2APU8luziaeFZ95AqA6vgsSFoK8:2SSSWS6CXDX0/dZBY4nI0jDSYAheaezk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2116 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE 2116 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2116 wrote to memory of 4500 2116 EXCEL.EXE 83 PID 2116 wrote to memory of 4500 2116 EXCEL.EXE 83
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5c594835264fc80f0a51e06b0a05c089479176f0f1bec2513dcdd0b4282cac57.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4500
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3528