Analysis

  • max time kernel
    99s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 17:45

General

  • Target

    7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls

  • Size

    688KB

  • MD5

    64af151191f5d60b7ace7a8cb31e7948

  • SHA1

    82c8c29ab11837559b42a7565e6fa14668dc9ece

  • SHA256

    7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd

  • SHA512

    6e34005d4dce744969886be0dae13d653ae3dd9632e539b94bc5891b90b48b450cf4d1105ec8b2f6cf9a3dfbe859bca0cad102fae4b2925d03ec1f3d0927e94e

  • SSDEEP

    6144:6KmZ+RwPONXoRjDhIcp0fDlavx+W26nADOiYsPKcK7jtlSEKWiWJKL4lHWyy5zJ+:6KrpM3STW7jbqzJVzNJ0hDkZpI7Z

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7b34fede01164a6602eccc2e71a58535a8e484562fe634c82fcf87256f951bcd.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2252-132-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-134-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-135-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-133-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-136-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-137-0x00007FF9617E0000-0x00007FF9617F0000-memory.dmp

    Filesize

    64KB

  • memory/2252-138-0x00007FF9617E0000-0x00007FF9617F0000-memory.dmp

    Filesize

    64KB

  • memory/2252-140-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-142-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-143-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB

  • memory/2252-141-0x00007FF963870000-0x00007FF963880000-memory.dmp

    Filesize

    64KB