Analysis
-
max time kernel
104s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:24
Static task
static1
Behavioral task
behavioral1
Sample
0038abade2b805ab94689752e8ae15cf99dcc9aba5acdf74c77502a89bcee2bd.xlsx
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0038abade2b805ab94689752e8ae15cf99dcc9aba5acdf74c77502a89bcee2bd.xlsx
Resource
win10v2004-20220901-en
General
-
Target
0038abade2b805ab94689752e8ae15cf99dcc9aba5acdf74c77502a89bcee2bd.xlsx
-
Size
20KB
-
MD5
533f04dc35371b3561b7e4d10fc22ed1
-
SHA1
b6a4b9f0f642c36a3e88806d19150d299b0cc27b
-
SHA256
0038abade2b805ab94689752e8ae15cf99dcc9aba5acdf74c77502a89bcee2bd
-
SHA512
74eb3fd57191571ed843db53565c82db7b4412e0745f59ad1c6dc6f4542fbe3b1268ffcd13d8b57ae4f461aa2bf09162b861ef0acc22ea6772521f6f50346000
-
SSDEEP
384:x5TxQRP5fyHzgnEUUzRoyeQGJVJUDMEtdmiGe98U5vnbXozP:LTaRPgHz3ddoyRGZUDjtdJKgvnboT
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3564 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE 3564 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3564 wrote to memory of 4864 3564 EXCEL.EXE 81 PID 3564 wrote to memory of 4864 3564 EXCEL.EXE 81
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\0038abade2b805ab94689752e8ae15cf99dcc9aba5acdf74c77502a89bcee2bd.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:100