Analysis
-
max time kernel
152s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 19:12
Static task
static1
Behavioral task
behavioral1
Sample
5b4bc8b69594c23c5b2415956ca37dd30da59de550c756aa71ca8c3a009aae7a.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b4bc8b69594c23c5b2415956ca37dd30da59de550c756aa71ca8c3a009aae7a.xls
Resource
win10v2004-20220812-en
General
-
Target
5b4bc8b69594c23c5b2415956ca37dd30da59de550c756aa71ca8c3a009aae7a.xls
-
Size
33KB
-
MD5
75940363a8d83a3fbaf57cc5d8c28d0c
-
SHA1
756b03ca2e0208d0d8105bcc0450b4eb124a7863
-
SHA256
5b4bc8b69594c23c5b2415956ca37dd30da59de550c756aa71ca8c3a009aae7a
-
SHA512
a8c740eaa2d12ef62cd5586390461e7ce12214de36df9b76461a3d42f2c09bb74d1704ac1b672c034b359e104f9da9865b21eb70558c1b4410973736639e5495
-
SSDEEP
384:beeeqbCzwR2DJV/I7o12OE9y/rf5rFa2/5UldSsZQ2jRN:beeeqbCzwR2DJ5I7olH/DX75U+ePVN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4292 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE 4292 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\5b4bc8b69594c23c5b2415956ca37dd30da59de550c756aa71ca8c3a009aae7a.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4292