Analysis
-
max time kernel
204s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
壨/20141119_101200_2.jpg
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
壨/20141119_101200_2.jpg
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
壨/FTTHַϵ�.xls
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
壨/FTTHַϵ�.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
壨/FTTH··Ϣ -.xls
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
壨/FTTH··Ϣ -.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
壨/.doc
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
壨/.doc
Resource
win10v2004-20221111-en
General
-
Target
壨/FTTHַϵ�.xls
-
Size
173KB
-
MD5
7125a21117eb4af8c21a28eab9288958
-
SHA1
c0621a04fead17232d47392890fa11e07107c0bf
-
SHA256
8e45f69ce85c08eb0226b02bfd1c9be04d82c8f87a1264c05cb68ef3f31cac0e
-
SHA512
582c5c53f0f3b0a63ade6ebf2505ec9507ce5d9842d60b47941a967d31a3b77b10b9234cb851ccf5aed375a7046f90b22dab0b8fc49dd3f51467b0d8455c3aca
-
SSDEEP
3072:rNckWMup9VgUzQcJXAOx6nIbiyPdM1ZxGPRkppN+ze6ZU9R:AmGXAOHbi0KDQZdm9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3028 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\壨\FTTHַϵ�.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3028