Analysis
-
max time kernel
101s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2022, 09:13
Static task
static1
Behavioral task
behavioral1
Sample
514b87e986532efc4b3cb79c4d3fe844e563f65060169e7a4ffd83634816f620.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
514b87e986532efc4b3cb79c4d3fe844e563f65060169e7a4ffd83634816f620.xlsx
Resource
win10v2004-20220812-en
General
-
Target
514b87e986532efc4b3cb79c4d3fe844e563f65060169e7a4ffd83634816f620.xlsx
-
Size
117KB
-
MD5
37c9a9b5de080781cd627146dfef8964
-
SHA1
ae86792d0587f04c6b51b380222611d53a510dc3
-
SHA256
514b87e986532efc4b3cb79c4d3fe844e563f65060169e7a4ffd83634816f620
-
SHA512
a9ff65f299f0bf226ed3d59702f094082fc311c13a5f83ac9640dfdcaf8fdcf2b9eb57ee73143947ec38296f059b9ebccca7933b2962e1824607d69a93c01266
-
SSDEEP
768:J2HB7ElxkRwOVHbtMEdf/2kIOVHbtMEa9BJ+fjA:J2hIlxie9B80
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2492 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE 2492 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\514b87e986532efc4b3cb79c4d3fe844e563f65060169e7a4ffd83634816f620.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2492