Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:22

General

  • Target

    d6c2a184e875ae64f9c02a4e778766e3f837ed0630ff4397c86da74c0fb2e654.xls

  • Size

    13KB

  • MD5

    140573ae6dc1ea352cbe8b6b6062df67

  • SHA1

    0eabae122f94dda70b2296ad2f2880f0239e379f

  • SHA256

    d6c2a184e875ae64f9c02a4e778766e3f837ed0630ff4397c86da74c0fb2e654

  • SHA512

    3036a48825e091c2fa48f14bc101d4fa5fd0a3eb4be529fa6e15cf0d63ad8c88d5d2513cb2aec9da77f8e78e02d9d4a81a0d3e1f6fe8d4d3390a0cba3c62bef5

  • SSDEEP

    48:rYLZgDTRfZS3qKIRvVIxIVwxKtBgVcr74fVqVs6RXMlO7xj9U+Ae7++QUpzTU3+:UqDdYaKpKUVcr5s6xMlKHxwUp8O

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d6c2a184e875ae64f9c02a4e778766e3f837ed0630ff4397c86da74c0fb2e654.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3564

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3564-132-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-133-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-134-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-135-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-136-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-137-0x00007FFDF4E50000-0x00007FFDF4E60000-memory.dmp
    Filesize

    64KB

  • memory/3564-138-0x00007FFDF4E50000-0x00007FFDF4E60000-memory.dmp
    Filesize

    64KB

  • memory/3564-140-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-141-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-142-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB

  • memory/3564-143-0x00007FFDF6EB0000-0x00007FFDF6EC0000-memory.dmp
    Filesize

    64KB