Analysis

  • max time kernel
    150s
  • max time network
    176s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:25

General

  • Target

    资料/12月、1月预订单退货率分析/徐州百大2.xls

  • Size

    38KB

  • MD5

    3051132f2b74c2cac081278661b60c82

  • SHA1

    f96e192f8a6899b0283840b54b348ab5b3489580

  • SHA256

    88b4e6224b416660cfd95cbeb048050d1cda5b010c83024b15c3bca1ec1f1066

  • SHA512

    83f501c236938884df20a8e0db0f35fff9d96638512a64e95883a88ecccb57a96f23f9aa019151ed8ce4ccac66295309f5f3bf465ed754d4c35a10feb581ddfb

  • SSDEEP

    768:S3333WaizET7lC3zoRID8dDvR2huZ95aLFJI0NdB:S3333WaizET7lC3zoRID8dDauZ95av

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\资料\12月、1月预订单退货率分析\徐州百大2.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2640

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2640-132-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-133-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-134-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-135-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-136-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-137-0x00007FF9D24F0000-0x00007FF9D2500000-memory.dmp
    Filesize

    64KB

  • memory/2640-138-0x00007FF9D24F0000-0x00007FF9D2500000-memory.dmp
    Filesize

    64KB

  • memory/2640-141-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-142-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-140-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB

  • memory/2640-143-0x00007FF9D4C70000-0x00007FF9D4C80000-memory.dmp
    Filesize

    64KB