Analysis

  • max time kernel
    201s
  • max time network
    215s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 03:09

General

  • Target

    d76b03ff5e685d40a5056cb70c46a3ac9313afbe40fe04c36fb27fdd0f86bc9b.xls

  • Size

    183KB

  • MD5

    d0b549524a1a0918a9152e690f3d59fb

  • SHA1

    b63bfb3f7ebfe0b10d288b0254b862cb9afdda65

  • SHA256

    d76b03ff5e685d40a5056cb70c46a3ac9313afbe40fe04c36fb27fdd0f86bc9b

  • SHA512

    d855eb74ba06fdee12a479e8165cda508aae9f09612c2d7f0f6e75c7c33905f19d0d09c53dea5ae19713da9d8da7293705375bfa36b84b801f6ca519368cf31b

  • SSDEEP

    3072:xdyug0R5BVhj2jcc0lbxOKIu8JtXwric:xdyu3R5BVhE4

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d76b03ff5e685d40a5056cb70c46a3ac9313afbe40fe04c36fb27fdd0f86bc9b.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1136

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1136-132-0x00007FFB5E990000-0x00007FFB5E9A0000-memory.dmp
    Filesize

    64KB

  • memory/1136-133-0x00007FFB5E990000-0x00007FFB5E9A0000-memory.dmp
    Filesize

    64KB

  • memory/1136-134-0x00007FFB5E990000-0x00007FFB5E9A0000-memory.dmp
    Filesize

    64KB

  • memory/1136-135-0x00007FFB5E990000-0x00007FFB5E9A0000-memory.dmp
    Filesize

    64KB

  • memory/1136-136-0x00007FFB5E990000-0x00007FFB5E9A0000-memory.dmp
    Filesize

    64KB

  • memory/1136-137-0x00007FFB5C930000-0x00007FFB5C940000-memory.dmp
    Filesize

    64KB

  • memory/1136-138-0x00007FFB5C930000-0x00007FFB5C940000-memory.dmp
    Filesize

    64KB