Analysis

  • max time kernel
    103s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/09/2022, 14:19

General

  • Target

    boobsnail.csv

  • Size

    157KB

  • MD5

    c7159a9a7dded06630c6fccb5540455a

  • SHA1

    14818038249ee93d4ccc40eb4ac92556bd9d2fd4

  • SHA256

    7ca819df2b5a76d7a58c79f27b82cb0eaace54090ec71e70eecf991d587745a9

  • SHA512

    05d2ef7e5cd56f179f5fd00c2ecfd8efa17b757a1c6d69ab01f26065a248492162123538bb3385e7d0d5b3528e741485cfb7cc91054e5d766bec2f99d086d0b5

  • SSDEEP

    1536:9uDkRcUkvP1XedPqXYtSUrILUg4yH3yuYgQQeh5BcGsleO6wHcfzEFAYVO0JWNr0:IrUGo3urH3yuYgbyc18LEFavg

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\boobsnail.csv"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2168

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2168-132-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-133-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-134-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-135-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-136-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-137-0x00007FFA6FA80000-0x00007FFA6FA90000-memory.dmp

          Filesize

          64KB

        • memory/2168-138-0x00007FFA6FA80000-0x00007FFA6FA90000-memory.dmp

          Filesize

          64KB

        • memory/2168-141-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-140-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-142-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB

        • memory/2168-143-0x00007FFA72110000-0x00007FFA72120000-memory.dmp

          Filesize

          64KB