Analysis

  • max time kernel
    206s
  • max time network
    234s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/11/2022, 18:27

General

  • Target

    大邑安仁金安小区-底商/大邑—安仁金安小区外线资料/管道信息表-无新建管道.xls

  • Size

    13KB

  • MD5

    61e494bfec97dec1b4544bac96d5496c

  • SHA1

    4266294b6df6c18460fb69e9330fc40cf554342c

  • SHA256

    22edef20f2cb6311b602d9b56275b2e6cb259420029ab8435444cc71ad0fb7d3

  • SHA512

    03715c9b5dc1ae149eebb7180e5fe2f9c79a4253524ef87ebefe4f54b78c11ffa25c064c77aef1cae4d2554cc970ccca5f667ebf0d6a962ef5d09605329571e0

  • SSDEEP

    384:9hhhExtVgrfMw8jIxLTFNMsx7R8X4T1axZWefmUiBf1LbO4/9dvX/AbdnXjWpZT2:9hhhExtVgrfMw8jIxLTFNMsx7RvkdnXL

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\大邑安仁金安小区-底商\大邑—安仁金安小区外线资料\管道信息表-无新建管道.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3384

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3384-132-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-133-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-134-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-135-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-136-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-137-0x00007FFBEDA70000-0x00007FFBEDA80000-memory.dmp

    Filesize

    64KB

  • memory/3384-138-0x00007FFBEDA70000-0x00007FFBEDA80000-memory.dmp

    Filesize

    64KB

  • memory/3384-140-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-141-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-142-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB

  • memory/3384-143-0x00007FFBEFBD0000-0x00007FFBEFBE0000-memory.dmp

    Filesize

    64KB