Analysis
-
max time kernel
103s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
9d3de7c30d9d99621f42e1c538ac87ddca462f64cb7f177bda3cb7e5c1bc54b8.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9d3de7c30d9d99621f42e1c538ac87ddca462f64cb7f177bda3cb7e5c1bc54b8.xls
Resource
win10v2004-20220812-en
General
-
Target
9d3de7c30d9d99621f42e1c538ac87ddca462f64cb7f177bda3cb7e5c1bc54b8.xls
-
Size
3.6MB
-
MD5
aa4698ebb548a741042a8682f7f5033c
-
SHA1
f5e2212b7300d2ffa7057e81bbcb4621424a45c7
-
SHA256
9d3de7c30d9d99621f42e1c538ac87ddca462f64cb7f177bda3cb7e5c1bc54b8
-
SHA512
ef2d52b7706678453ca8ca06f0997c41ba51be326e90c0b8b0717c38c3679e470cf77c58cc5d292f9fb8069297ef30ff21f621a2251d06b161a4499e0ebcd574
-
SSDEEP
49152:X6HW7Ptn5IS+LVr6pG1hhliREs4+r/FlQmlbBkmsTFakAYung:X6HW7159+56c1RiREs4FTFJAYu
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4764 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE 4764 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4764 wrote to memory of 3796 4764 EXCEL.EXE 90 PID 4764 wrote to memory of 3796 4764 EXCEL.EXE 90
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9d3de7c30d9d99621f42e1c538ac87ddca462f64cb7f177bda3cb7e5c1bc54b8.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3796
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:4288