Analysis
-
max time kernel
104s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
072d4cf1d323d3177154fdbfedd4e7f8943edd97ad5d1d4c8d9774ac2b86e271.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
072d4cf1d323d3177154fdbfedd4e7f8943edd97ad5d1d4c8d9774ac2b86e271.xls
Resource
win10v2004-20220901-en
General
-
Target
072d4cf1d323d3177154fdbfedd4e7f8943edd97ad5d1d4c8d9774ac2b86e271.xls
-
Size
35KB
-
MD5
aa66821f337a40bd200c1ddab53de496
-
SHA1
49349bc80a3a4df83a3a6de79bc967b9c84bde24
-
SHA256
072d4cf1d323d3177154fdbfedd4e7f8943edd97ad5d1d4c8d9774ac2b86e271
-
SHA512
1f4f0d7291b78c94a34298c48204bd647145802742c246f19e96248ebf69346f33cc2bc63e39fe1580e5bd12d2be475cc44f39636bb3f79a795b10970828de28
-
SSDEEP
768:pMMMMgQBbX/uOJ+6lFMu2foBaR2rTwyZ95rJzJ+Uun2t9HDcRQXr+:pMMMMgQBbX/uOJ+6lFMu2foB0yZ95f5i
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2820 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE 2820 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\072d4cf1d323d3177154fdbfedd4e7f8943edd97ad5d1d4c8d9774ac2b86e271.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2820