Analysis
-
max time kernel
107s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2022 01:04
Behavioral task
behavioral1
Sample
SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.22399.31359.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.22399.31359.xls
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.22399.31359.xls
-
Size
280KB
-
MD5
deeac3fe7fbebb90483ee76db1e2bf17
-
SHA1
b77bb5abf1aa44778fa7038f3af467d968cc61ae
-
SHA256
b377cb39d6c6b90ae6a7942c9c80992e636c5607b28b9e704fc77a5d68acc17c
-
SHA512
f0919d08e1b429084037edde43377220096d267f98f125e673259148e7dba9d7cc9808b03e403002ddb4cdc1146864e9de45c06f26c23424ebee3a877ffa5f3f
-
SSDEEP
6144:6cPiTQAVW/89BQnmlcGvgZ7rDjo8UOMzJK+tfq5I:5pO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3756 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.XLM.Trojan.Abracadabra.35.Gen.22399.31359.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3756