Analysis

  • max time kernel
    192s
  • max time network
    203s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 19:33

General

  • Target

    b2b34e7cc5a28d14d887a7d424e3c21672ff68a34d32b1c9faeb7cf544129ef2.xls

  • Size

    44KB

  • MD5

    390624455c7e25477f9553011f39796c

  • SHA1

    65b2763029a4249e591db03d5d1bec0187aba4b8

  • SHA256

    b2b34e7cc5a28d14d887a7d424e3c21672ff68a34d32b1c9faeb7cf544129ef2

  • SHA512

    5876c10bae24d6df03c2c0d268a1a6e915f9de418ba8c369c5a8b8370b66b4b574217a91d16a86a6ee3aacfc53a143c95a040130e796ef8be274852a2d7b81f3

  • SSDEEP

    768:+hR1vT2E3whCjd5kpWzQFi/2XU9FE1q4KMY:+hRHd5kpWzQFi/2XU9FE1q4KD

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b2b34e7cc5a28d14d887a7d424e3c21672ff68a34d32b1c9faeb7cf544129ef2.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:3920

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3920-132-0x00007FF885A70000-0x00007FF885A80000-memory.dmp
    Filesize

    64KB

  • memory/3920-133-0x00007FF885A70000-0x00007FF885A80000-memory.dmp
    Filesize

    64KB

  • memory/3920-134-0x00007FF885A70000-0x00007FF885A80000-memory.dmp
    Filesize

    64KB

  • memory/3920-135-0x00007FF885A70000-0x00007FF885A80000-memory.dmp
    Filesize

    64KB

  • memory/3920-136-0x00007FF885A70000-0x00007FF885A80000-memory.dmp
    Filesize

    64KB

  • memory/3920-137-0x00007FF8838B0000-0x00007FF8838C0000-memory.dmp
    Filesize

    64KB

  • memory/3920-138-0x00007FF8838B0000-0x00007FF8838C0000-memory.dmp
    Filesize

    64KB