Analysis
-
max time kernel
104s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2022, 23:30
Static task
static1
Behavioral task
behavioral1
Sample
JcƏo[ 202210.xls
Resource
win7-20220812-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
JcƏo[ 202210.xls
Resource
win10v2004-20220901-en
4 signatures
150 seconds
General
-
Target
JcƏo[ 202210.xls
-
Size
423KB
-
MD5
d6961cbd5cb5bf2e09812f6af5d0d3d1
-
SHA1
296bccd99d030a21cc155b06b4a2fe9115934513
-
SHA256
b0c39f884f519cf3b7199e69987347cc1daf7c8ee4ce1e83b9602b3d535df731
-
SHA512
bc52159e21840087aa7b71b4af04ca47762e3e9eb848d24c5ad5dcd84e47a93ea6fd7eb412915611a1073718d8397023a7e3deb3514b355de08940b46a8bcd8d
-
SSDEEP
1536:dkcBTmiYgIg98TXJ8QJrSey3VFD6r5yeHDPICc7+SzW1USFNeRfD/Sf9y3S3Gp2h:dLkikhK
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4460 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE 4460 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JcƏo[ 202210.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4460