Analysis

  • max time kernel
    149s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:21

General

  • Target

    2358da297b3a1e5991dde93da3b67575dc5dceba8ab3272329f41ad38637bd20.xls

  • Size

    13KB

  • MD5

    a060d6732197078af86ca53d8b872326

  • SHA1

    f7d35981eba327dffaf04a6bf0c2e4b2506b52a4

  • SHA256

    2358da297b3a1e5991dde93da3b67575dc5dceba8ab3272329f41ad38637bd20

  • SHA512

    7cfd8e774c5c547c51f58419b5faf0f6c6d17b2067aaca6e1596543fea8d684854ea72db72e7ed9efaabe9fb6917d044b6e338b55384983b6ca4450afe28c911

  • SSDEEP

    48:rYLZgDTR4rS3VOAIEIL0/Avt1Pnucr74fVqFB8SP56TqGWeJU3+:UqDdtfs2crX9P8TFW9O

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2358da297b3a1e5991dde93da3b67575dc5dceba8ab3272329f41ad38637bd20.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4960

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4960-132-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-133-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-134-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-135-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-136-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-137-0x00007FFA4A2F0000-0x00007FFA4A300000-memory.dmp

    Filesize

    64KB

  • memory/4960-138-0x00007FFA4A2F0000-0x00007FFA4A300000-memory.dmp

    Filesize

    64KB

  • memory/4960-140-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-141-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-142-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB

  • memory/4960-143-0x00007FFA4CB50000-0x00007FFA4CB60000-memory.dmp

    Filesize

    64KB