Analysis
-
max time kernel
102s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
27/10/2022, 01:09
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.37692.13430.15154.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Exploit.Siggen3.37692.13430.15154.xls
Resource
win10v2004-20220812-en
General
-
Target
SecuriteInfo.com.Exploit.Siggen3.37692.13430.15154.xls
-
Size
151KB
-
MD5
8e5c9b8b0caff5d13ba976d5c529c5c4
-
SHA1
52d846fbf7d79c235d1a7708329956cd8280d563
-
SHA256
05801b01be1ce684339903e7cb981f17df5f966f77536ae6ea799d6bf6be5155
-
SHA512
ae3134fe2707edd229d95e0431bc667c6fb96b6a2c4bcad250dab7de2c51802fc821a4175c0faa0b5c7008c35e430d919e25a75333642412dd5765e09eea5c81
-
SSDEEP
3072:RjTI8HMAxU1ws/ipdNuGsc+jwlLAP/KOZ1ew69HeZ7qcV:5TpTOwsGGGs9wmXew69HeZ7
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4864 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE 4864 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Siggen3.37692.13430.15154.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4864