Analysis
-
max time kernel
100s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2022, 04:07
Static task
static1
Behavioral task
behavioral1
Sample
efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44.xls
Resource
win10v2004-20220812-en
General
-
Target
efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44.xls
-
Size
35KB
-
MD5
06475191c817855a611090f36f76572a
-
SHA1
dc596863e32915fbb053aab07be20cc8aff3043e
-
SHA256
efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44
-
SHA512
33468d10118e52afd4419f09db4ecfed99ee9228d2974fc1db04c781ad9dbd0609c1e3b32a476f34fefb03d3d9f0467557a50c188b80dc83d199077fb565faf1
-
SSDEEP
384:rI9KjOaM2ctZam3sypZ3te/ye8b6b75+Sj8bewfBJzdyUw3Tqnl3yjtxz6LwTbt9:rIMjOaV2xy9DbRxz6LD9aL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2568 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2568 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE 2568 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2568