Analysis
-
max time kernel
103s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26/09/2022, 14:19
Static task
static1
Behavioral task
behavioral1
Sample
boobsnail.csv
Resource
win7-20220901-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
boobsnail.csv
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
boobsnail.csv
-
Size
157KB
-
MD5
c7159a9a7dded06630c6fccb5540455a
-
SHA1
14818038249ee93d4ccc40eb4ac92556bd9d2fd4
-
SHA256
7ca819df2b5a76d7a58c79f27b82cb0eaace54090ec71e70eecf991d587745a9
-
SHA512
05d2ef7e5cd56f179f5fd00c2ecfd8efa17b757a1c6d69ab01f26065a248492162123538bb3385e7d0d5b3528e741485cfb7cc91054e5d766bec2f99d086d0b5
-
SSDEEP
1536:9uDkRcUkvP1XedPqXYtSUrILUg4yH3yuYgQQeh5BcGsleO6wHcfzEFAYVO0JWNr0:IrUGo3urH3yuYgbyc18LEFavg
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2168 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE 2168 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\boobsnail.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2168