Analysis

  • max time kernel
    187s
  • max time network
    202s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:26

General

  • Target

    市政工程表格/市政资料/003.xls

  • Size

    21KB

  • MD5

    0386b3540ee93f2b3d358acb00bf8f0e

  • SHA1

    3486aefc5ca0b8f9d197f4be2475e5e1bb0086be

  • SHA256

    0aa93ff4088cc3a184ae2b05bfe729fe7d9d94169aac8b6318c85baba4416eea

  • SHA512

    cc3bcfc7e5b8acf8a5112991a739e8c5954435c37f2b2d70b22446fc0ddcc5c70ff42c6d9e816027a90d5758f7cfd883bf96378f3fc9edb3d1abe1004f4144d4

  • SSDEEP

    192:UiDpwpwpwpwqrvgR2jJKnJFLJHGFwVgwnfzj5Luo1LVP:neeeeqrvgR2QJV9Vnbj5yg

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\市政工程表格\市政资料\003.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3188

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3188-132-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-133-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-134-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-135-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-136-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-137-0x00007FF92FD90000-0x00007FF92FDA0000-memory.dmp
    Filesize

    64KB

  • memory/3188-138-0x00007FF92FD90000-0x00007FF92FDA0000-memory.dmp
    Filesize

    64KB

  • memory/3188-140-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-141-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-142-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB

  • memory/3188-143-0x00007FF932590000-0x00007FF9325A0000-memory.dmp
    Filesize

    64KB