Analysis
-
max time kernel
186s -
max time network
212s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2022, 21:04
Static task
static1
Behavioral task
behavioral1
Sample
壨/20141119_101200_2.jpg
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
壨/20141119_101200_2.jpg
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
壨/FTTHַϵ�.xls
Resource
win7-20221111-en
Behavioral task
behavioral4
Sample
壨/FTTHַϵ�.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
壨/FTTH··Ϣ -.xls
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
壨/FTTH··Ϣ -.xls
Resource
win10v2004-20221111-en
Behavioral task
behavioral7
Sample
壨/.doc
Resource
win7-20220901-en
Behavioral task
behavioral8
Sample
壨/.doc
Resource
win10v2004-20221111-en
General
-
Target
壨/FTTH··Ϣ -.xls
-
Size
11KB
-
MD5
2c25121080791e53f26f03c3547e4448
-
SHA1
64b8ececb2c8d2a9337c62f9e3c87f457befc75e
-
SHA256
9fd41eca6d29193fdfc7e276b31f9e5fa87d28e30acb9565019bc6bfa912aad0
-
SHA512
73f5a37cef4d7640b6d43fdfe843a4cf5b0e193f176b003d596fe44ab8f4043e15a7f089c0f29ff4dcb55a0c84870d9bc6b134bc1a742974a5d031238bfcbcaa
-
SSDEEP
192:+/pwpwpweSlp328dMj6pRQzXHeClLyc8S0aPbKotI8hhPPPPPPPPPPhqIAX0xICC:OeeepR28dMj67QzXHeeLyc8S0aPbKmqL
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3820 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE 3820 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\壨\FTTH··Ϣ -.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3820