Analysis

  • max time kernel
    135s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 02:53

General

  • Target

    08deb10d392a330e436f61359b894ede6f803b6809df5001c0a9710a0ce8bbef.xls

  • Size

    186KB

  • MD5

    a500ba145ffd6dbdc2f091d979973ee2

  • SHA1

    953a9adf79f2060b48db7c2fdc678f3d8527aba6

  • SHA256

    08deb10d392a330e436f61359b894ede6f803b6809df5001c0a9710a0ce8bbef

  • SHA512

    b179c08b8845f18fd6b12a606ccefe3db43ef23798312d86a72c9d62ec42a57eb155351416e12c71fecae9c7a92609dac76f6d332d78b79cfb766574a48dedce

  • SSDEEP

    1536:1bbbbvbYiT12vQApKi1qGeSnuyMjbYwugu5pyrYNQk9RBuYOwDg7Hgl6J5uRKHHS:6QkdDUHgleHHoT0F9hh2CcnKV6o+

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\08deb10d392a330e436f61359b894ede6f803b6809df5001c0a9710a0ce8bbef.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4276
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3232
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:3616

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3232-139-0x0000000000000000-mapping.dmp
      • memory/4276-132-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-133-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-134-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-135-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-136-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-137-0x00007FF85A490000-0x00007FF85A4A0000-memory.dmp
        Filesize

        64KB

      • memory/4276-138-0x00007FF85A490000-0x00007FF85A4A0000-memory.dmp
        Filesize

        64KB

      • memory/4276-141-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-142-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-143-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB

      • memory/4276-144-0x00007FF85CAD0000-0x00007FF85CAE0000-memory.dmp
        Filesize

        64KB