Analysis
-
max time kernel
102s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2022 10:26
Static task
static1
Behavioral task
behavioral1
Sample
RFQ- TENDER 190616114.xlsx
Resource
win7-20220812-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
RFQ- TENDER 190616114.xlsx
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
RFQ- TENDER 190616114.xlsx
-
Size
1.8MB
-
MD5
bc811901a34af9b0310fdce3a15f4297
-
SHA1
dfae700ccd350396577fe1732ccbf451901e1f04
-
SHA256
653e1d9d2480e09b710faad26f81a30d1e7bc21dae7ba9faccced7c515f1ead7
-
SHA512
d405a33e989f9c58628d046d972ba98f0da342f7ef650fad17c035e54b9271eb5cd05a1b9947d26647a14258d0bf7c59036db171f3ab0ba5bebb3b7fdc4ac733
-
SSDEEP
49152:i/XEG+EAa1n4e3IQdmXQ7jmjPLPUuFoBEMUr:iPEeF3IemA7jmjPTURUr
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2376 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE 2376 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ- TENDER 190616114.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2376