Analysis

  • max time kernel
    152s
  • max time network
    177s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 18:28

General

  • Target

    外线/光缆成端信息表(沙子堰(底商)-).xls

  • Size

    145KB

  • MD5

    9d129642317610c06b1c578995f493da

  • SHA1

    a4a50dbbfeeb6a0634a33b1659bba90c4631c3e2

  • SHA256

    1c36075e9fcf838c98e18d198cbddfb207debd9293b8d46062b41ee46a88ad43

  • SHA512

    40282b1736ba4610991b987ae4c3349b27318db8a569343d09d97dd334fdea180701a26e666420a8019e0b22833f1c388ffae3b93d765f1c849e13ea61ec83ec

  • SSDEEP

    3072:o2Bv+RjNQt50ph+T1CSI+F6ywa3w4GnW1+wZ1l:XY0j0phe3XX6W1+qb

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\外线\光缆成端信息表(沙子堰(底商)-).xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1800

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1800-132-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-133-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-134-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-136-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-135-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-137-0x00007FF8BE900000-0x00007FF8BE910000-memory.dmp

    Filesize

    64KB

  • memory/1800-138-0x00007FF8BE900000-0x00007FF8BE910000-memory.dmp

    Filesize

    64KB

  • memory/1800-140-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-141-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-142-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB

  • memory/1800-143-0x00007FF8C0C50000-0x00007FF8C0C60000-memory.dmp

    Filesize

    64KB