Analysis
-
max time kernel
101s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2022 06:33
Static task
static1
Behavioral task
behavioral1
Sample
payment confirmation CFY 19092211.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
payment confirmation CFY 19092211.xlsx
Resource
win10v2004-20220901-en
General
-
Target
payment confirmation CFY 19092211.xlsx
-
Size
2.7MB
-
MD5
6bf8f67b71837360fa764886b55f2ca0
-
SHA1
432e670f3e8ed4e6e5fe25ac282b31c2e9b3763e
-
SHA256
f6356c5334bb4c962bf47d203ddd6c222a17eee5dda3a9d466273f57c9883a5c
-
SHA512
ad6dfe4dc97e084904b9633feae5116c9270fdd4f649d03b81f3509b532d9331d1a4403eda955e3bc69f591c8c8ad98eba80bf063ba634365fa17b109f27fcd9
-
SSDEEP
49152:gSEb7FapTNHtyKdCcBFD7iMnmnfdCP3CGq78raHBxSWUxEDj1YYY:gTSNyKmMnmw3CGqbvf/DiYY
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3672 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE 3672 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\payment confirmation CFY 19092211.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3672