Analysis
-
max time kernel
168s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
09/11/2022, 19:10
Behavioral task
behavioral1
Sample
387f95a838c7e7698e1387206b627526d9265cadeef240338b00ccaa77490213.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
387f95a838c7e7698e1387206b627526d9265cadeef240338b00ccaa77490213.xls
Resource
win10-20220812-en
General
-
Target
387f95a838c7e7698e1387206b627526d9265cadeef240338b00ccaa77490213.xls
-
Size
91KB
-
MD5
2eaac0a86697291fa4f23b238b4ab213
-
SHA1
8e2aac53171994d227070f7f9b377eb502c225b3
-
SHA256
387f95a838c7e7698e1387206b627526d9265cadeef240338b00ccaa77490213
-
SHA512
bae3026be3476efeb851e398a199827a7112aa5b59f830f270681fbed1171fa2478d5a607df7c05a54aa0be05fb713f4e7c9ec3bddc11d80d6979ca38c1528f8
-
SSDEEP
1536:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dgEbCXuZH4gb4CEn9J4ZAEM:LKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg5
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4748 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\387f95a838c7e7698e1387206b627526d9265cadeef240338b00ccaa77490213.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4748