Analysis
-
max time kernel
103s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 19:15
Static task
static1
Behavioral task
behavioral1
Sample
2922957b92d332986f2a5989dd5e93432cb9fa3f6982cd3eb44e88947d24f24b.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2922957b92d332986f2a5989dd5e93432cb9fa3f6982cd3eb44e88947d24f24b.xls
Resource
win10v2004-20220901-en
General
-
Target
2922957b92d332986f2a5989dd5e93432cb9fa3f6982cd3eb44e88947d24f24b.xls
-
Size
25KB
-
MD5
2015672d60c37e916a48e460aa30e0d3
-
SHA1
a6576d152c02d088d6e53e34dfb6d7574c77a220
-
SHA256
2922957b92d332986f2a5989dd5e93432cb9fa3f6982cd3eb44e88947d24f24b
-
SHA512
8127ea1e4d147d99b3aad8d4f2fb8c6f3b92ba629a509d7358dc78d81f287cb61fedc405b340d8524ab58aea048f6156bbbf9568fdb5de1a306aa711c80dfbe9
-
SSDEEP
192:uqDbaNkMif2pUMBUAoL283WcidX9snNlBNsEFIM:yFifM2AoaYCsNlX/f
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4344 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE 4344 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2922957b92d332986f2a5989dd5e93432cb9fa3f6982cd3eb44e88947d24f24b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4344