Analysis
-
max time kernel
99s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 17:45
Static task
static1
Behavioral task
behavioral1
Sample
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls
Resource
win10v2004-20220901-en
General
-
Target
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls
-
Size
688KB
-
MD5
64af151191f5d60b7ace7a8cb31e7948
-
SHA1
82c8c29ab11837559b42a7565e6fa14668dc9ece
-
SHA256
7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd
-
SHA512
6e34005d4dce744969886be0dae13d653ae3dd9632e539b94bc5891b90b48b450cf4d1105ec8b2f6cf9a3dfbe859bca0cad102fae4b2925d03ec1f3d0927e94e
-
SSDEEP
6144:6KmZ+RwPONXoRjDhIcp0fDlavx+W26nADOiYsPKcK7jtlSEKWiWJKL4lHWyy5zJ+:6KrpM3STW7jbqzJVzNJ0hDkZpI7Z
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2252 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE 2252 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2252