Analysis
-
max time kernel
106s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2022, 21:18
Static task
static1
Behavioral task
behavioral1
Sample
i/Data_Leaks_1_copy.xlsx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
i/Data_Leaks_1_copy.xlsx
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
sequoia.exe
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
sequoia.exe
Resource
win10v2004-20220812-en
General
-
Target
i/Data_Leaks_1_copy.xlsx
-
Size
3.7MB
-
MD5
47642fe52b849964957ece7be76c4ed4
-
SHA1
5c91d9e1b0cc662a97b7da88be76c52891e6cf6d
-
SHA256
bc0cc6b7e74fd2b36d7fc3a8bfad06dece98857e03e3f461aeac7d7c5dd757a0
-
SHA512
27d2e20ea83197714af44ca80f25c8ee4a251c4be00355c75051ef0f416fb5b40245d9caabba619524dda45c3d5eb73b3e6f360118ff9c3c821f46c38e7ce5b6
-
SSDEEP
98304:PKIdSdfrStPVLkXF72TFIBs2Y0+Z2i5n939lNWuQAc9UdEdg5:PKGF9L1gNYCiF93vQ9IEg
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1408 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE 1408 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\i\Data_Leaks_1_copy.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1408