Analysis
-
max time kernel
158s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 18:28
Static task
static1
Behavioral task
behavioral1
Sample
3f87fc00a0098a44f28968f9f897dcac39eea227aa9605d8e8062c0b37d37a02.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3f87fc00a0098a44f28968f9f897dcac39eea227aa9605d8e8062c0b37d37a02.xlsx
Resource
win10v2004-20220812-en
General
-
Target
3f87fc00a0098a44f28968f9f897dcac39eea227aa9605d8e8062c0b37d37a02.xlsx
-
Size
11KB
-
MD5
82b868503f48ee5743ca8c0487924ddb
-
SHA1
08cb5b06da1049b08a2db647e7ccf794c21ce17b
-
SHA256
3f87fc00a0098a44f28968f9f897dcac39eea227aa9605d8e8062c0b37d37a02
-
SHA512
65dee39d7020023407c2d39a3846bd8170ff4ccc433613672afae6459889ff263ef3ff6fdab35b3744a9d0653f57087ef7248508a0035ee0f1e390c5d761acb3
-
SSDEEP
192:8RuQ59vSKiHBNUgdRhjal3zkjX3zk3aovnaUV8IsCieMfsl7peu9Jy8ij+:O5lSHnOljkjXjk3ao/VTMfsX+8p
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1540 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE 1540 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3f87fc00a0098a44f28968f9f897dcac39eea227aa9605d8e8062c0b37d37a02.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1540