Analysis
-
max time kernel
101s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2022, 22:32
Behavioral task
behavioral1
Sample
49a09788294b5653d92289becd53ea9056a96850ad44f3f0c7c2f437369e9b06.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
49a09788294b5653d92289becd53ea9056a96850ad44f3f0c7c2f437369e9b06.xls
Resource
win10v2004-20220812-en
General
-
Target
49a09788294b5653d92289becd53ea9056a96850ad44f3f0c7c2f437369e9b06.xls
-
Size
59KB
-
MD5
22b1e36af59bb5628deb0dea6e7a92e6
-
SHA1
d7198d48766dc7be6242345f8ea016ba9ae5a8fd
-
SHA256
49a09788294b5653d92289becd53ea9056a96850ad44f3f0c7c2f437369e9b06
-
SHA512
21a7c37a4473b7d7dfab201a55dc775bf4119d8ee16e761ed0060bbaffd6f2f01b3713570e870813e0949d2ed45e79281a7ff6b3c0fe38cbea1d32cf86e80929
-
SSDEEP
1536:VjOVXTIEoVSbkQfYvehVIgdEmJbcatO66WpK3pxr38ly6TK1oveaQ:qfYvehVIgdECcatP6WpK3pxr38ly6TKz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4332 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE 4332 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\49a09788294b5653d92289becd53ea9056a96850ad44f3f0c7c2f437369e9b06.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4332