Analysis
-
max time kernel
128s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
04/11/2022, 00:02
Behavioral task
behavioral1
Sample
dd60cd3cc96f66c5cdb19cc4ce0ff8fac89d42387404e9ca47e3f072624d8694.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
dd60cd3cc96f66c5cdb19cc4ce0ff8fac89d42387404e9ca47e3f072624d8694.xls
Resource
win10-20220812-en
General
-
Target
dd60cd3cc96f66c5cdb19cc4ce0ff8fac89d42387404e9ca47e3f072624d8694.xls
-
Size
217KB
-
MD5
c390455d6b8638e769ed18f4d9a9f7b5
-
SHA1
26a914c437dd7660e6c4dab7ff6e414941194b99
-
SHA256
dd60cd3cc96f66c5cdb19cc4ce0ff8fac89d42387404e9ca47e3f072624d8694
-
SHA512
2c9f884a09779bdcfebef09227553f6ad2119ee0b5a601750a1b9bfc50bbe298075bf618d1f92d1d5c8e63f6fa400f56d6ab2556c48a787362199e43fc216c75
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dglyY+TAQXTHGUMEyP5p6f5jQm7pnT:1bGUMVWlbZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4816 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE 4816 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dd60cd3cc96f66c5cdb19cc4ce0ff8fac89d42387404e9ca47e3f072624d8694.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4816