Analysis
-
max time kernel
101s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 13:37
Static task
static1
Behavioral task
behavioral1
Sample
Fully Singed Aggrement.xlsx
Resource
win7-20220901-en
15 signatures
150 seconds
Behavioral task
behavioral2
Sample
Fully Singed Aggrement.xlsx
Resource
win10v2004-20220812-en
4 signatures
150 seconds
General
-
Target
Fully Singed Aggrement.xlsx
-
Size
742KB
-
MD5
f7afc6233a1a8e0607449a7552748722
-
SHA1
2c448ddfddb4b1c0481698d5181b6295633e1777
-
SHA256
fa167d133cb53da59f334ef6b12b264ef4e716a595084b6f922c4e447ea3def0
-
SHA512
2609c7ff2590ab5a1987462045b6e92188d52724fc0ddb91f6365e0446ccf2c9381de014893a9b1f77a454967de1e128aae725b6e3be99474d2b8c3e60cc3a51
-
SSDEEP
12288:38TesV8h7Hsh1mYDQlH4Fg4c6E3/pJ+QBC81JdzBffAHmZ76WW+y6ATWDmDjiYj:3OEzsh1msQlH74YpMiC81rJbbATb1j
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1620 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE 1620 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Fully Singed Aggrement.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1620