Analysis

  • max time kernel
    100s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2022, 04:07

General

  • Target

    efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44.xls

  • Size

    35KB

  • MD5

    06475191c817855a611090f36f76572a

  • SHA1

    dc596863e32915fbb053aab07be20cc8aff3043e

  • SHA256

    efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44

  • SHA512

    33468d10118e52afd4419f09db4ecfed99ee9228d2974fc1db04c781ad9dbd0609c1e3b32a476f34fefb03d3d9f0467557a50c188b80dc83d199077fb565faf1

  • SSDEEP

    384:rI9KjOaM2ctZam3sypZ3te/ye8b6b75+Sj8bewfBJzdyUw3Tqnl3yjtxz6LwTbt9:rIMjOaV2xy9DbRxz6LD9aL

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\efd2285d62beaaca4b8559c2a6e020e0a5b8c927fe6ea9794fa0870e9eda6f44.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:2568

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2568-132-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-133-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-134-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-135-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-136-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-137-0x00007FF979000000-0x00007FF979010000-memory.dmp

          Filesize

          64KB

        • memory/2568-138-0x00007FF979000000-0x00007FF979010000-memory.dmp

          Filesize

          64KB

        • memory/2568-139-0x00000125BDE00000-0x00000125BDFA2000-memory.dmp

          Filesize

          1.6MB

        • memory/2568-140-0x00007FF9921D0000-0x00007FF992C91000-memory.dmp

          Filesize

          10.8MB

        • memory/2568-141-0x00000125C0A10000-0x00000125C3470000-memory.dmp

          Filesize

          42.4MB

        • memory/2568-142-0x00000125BE250000-0x00000125BE4E4000-memory.dmp

          Filesize

          2.6MB

        • memory/2568-143-0x00000125BDC50000-0x00000125BDCAC000-memory.dmp

          Filesize

          368KB

        • memory/2568-144-0x00000125BE4F0000-0x00000125BE6B2000-memory.dmp

          Filesize

          1.8MB

        • memory/2568-145-0x00000125A5B70000-0x00000125A5B92000-memory.dmp

          Filesize

          136KB

        • memory/2568-146-0x00000125BF450000-0x00000125C01E0000-memory.dmp

          Filesize

          13.6MB

        • memory/2568-147-0x00000125A5B60000-0x00000125A5B70000-memory.dmp

          Filesize

          64KB

        • memory/2568-148-0x00000125A5C20000-0x00000125A5C2A000-memory.dmp

          Filesize

          40KB

        • memory/2568-149-0x00000125BDCB0000-0x00000125BDCD2000-memory.dmp

          Filesize

          136KB

        • memory/2568-150-0x00000125C7790000-0x00000125CBAA6000-memory.dmp

          Filesize

          67.1MB

        • memory/2568-151-0x000001259C630000-0x000001259C658000-memory.dmp

          Filesize

          160KB

        • memory/2568-152-0x000001259C6B0000-0x000001259C700000-memory.dmp

          Filesize

          320KB

        • memory/2568-153-0x000001259C610000-0x000001259C620000-memory.dmp

          Filesize

          64KB

        • memory/2568-154-0x000001259C680000-0x000001259C698000-memory.dmp

          Filesize

          96KB

        • memory/2568-155-0x000001259C760000-0x000001259C7BA000-memory.dmp

          Filesize

          360KB

        • memory/2568-156-0x00007FF9921D0000-0x00007FF992C91000-memory.dmp

          Filesize

          10.8MB

        • memory/2568-157-0x00000125A5BFB000-0x00000125A5BFF000-memory.dmp

          Filesize

          16KB

        • memory/2568-158-0x00000125A4CE0000-0x00000125A5208000-memory.dmp

          Filesize

          5.2MB

        • memory/2568-159-0x00000125A06B0000-0x00000125A07AC000-memory.dmp

          Filesize

          1008KB

        • memory/2568-161-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-162-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-163-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-164-0x00007FF97B4F0000-0x00007FF97B500000-memory.dmp

          Filesize

          64KB

        • memory/2568-165-0x00007FF9921D0000-0x00007FF992C91000-memory.dmp

          Filesize

          10.8MB

        • memory/2568-166-0x00000125A5BFB000-0x00000125A5BFF000-memory.dmp

          Filesize

          16KB