Analysis
-
max time kernel
98s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2022 15:08
Behavioral task
behavioral1
Sample
payments 25-03-2022_0907.xls
Resource
win10v2004-20220812-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
payments 25-03-2022_0907.xls
-
Size
55KB
-
MD5
78bd82f71a2bc8316fecd05b3cea8244
-
SHA1
d898b2a7e9977411330c81836faa0f3c81f61c9a
-
SHA256
2872574e90c90677a662e98f95aa608d8a648e46562c27d2c2bc700645d76ff3
-
SHA512
8f36958884785ce39ce1cf688519e7ba3c2f5aebd8afa4b66b78d00b81ff282cfead382b2be1a88f2361905d64768b47438057b6ee338403f4f0806d180d9897
-
SSDEEP
1536:ojKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgY5G9XSZAehUXepUNUDph:+Kpb8rGYrMPe3q7Q0XV5xtezEsi8/dg0
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4108 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE 4108 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\payments 25-03-2022_0907.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4108