Analysis
-
max time kernel
122s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2022 00:59
Behavioral task
behavioral1
Sample
1_5.xls
Resource
win7-20220812-en
windows7-x64
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
1_5.xls
Resource
win10v2004-20220812-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
1_5.xls
-
Size
217KB
-
MD5
a3a0a402b6f7d555e861fdcc751374e9
-
SHA1
cd9b95f7f0ff3fed6390e18ff1b2af6bb2124a9b
-
SHA256
f8aceb8b19f111dc3fda978cbcb8090edc9e3d5c79540af42736255fe957c0fa
-
SHA512
49378fb60369ea68e385db98e5316e29e34b6eb3d65ee1097886106dbf1da9d91ebfc7edaaaf47df9ff629743f1519c7970759cded84d83334561749527a8a16
-
SSDEEP
6144:zKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgXyY+TAQXTHGUMEyP5p6f5jQmK:DbGUMVWlbK
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1944 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE 1944 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1_5.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1944