Analysis
-
max time kernel
151s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 19:57
Behavioral task
behavioral1
Sample
2015届学生毕业设计指导老师安排表.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
2015届学生毕业设计指导老师安排表.xls
Resource
win10v2004-20220901-en
Behavioral task
behavioral3
Sample
2015届毕业生就业证明函/2015届毕业生就业证明函模板.doc
Resource
win7-20220901-en
Behavioral task
behavioral4
Sample
2015届毕业生就业证明函/2015届毕业生就业证明函模板.doc
Resource
win10v2004-20221111-en
Behavioral task
behavioral5
Sample
2015届毕业生就业证明函/说明.doc
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
2015届毕业生就业证明函/说明.doc
Resource
win10v2004-20221111-en
General
-
Target
2015届学生毕业设计指导老师安排表.xls
-
Size
54KB
-
MD5
bbe9105753e2bb0923f8fda1251538c6
-
SHA1
e8ff2dca6af8bc8a45cc58e2d80142b6a172637d
-
SHA256
802306f0abcd96868a386ad84ba2644645e4e4072f17b1cb230ae6c85383dc7c
-
SHA512
69193e1900591e41d7a8c64d31d6797c76caf113e7b5db2d330259faaf31b236fb90fdc95f3671611ae53f3f75a5d3171db9c8457328fc09ccecc5896c787e7f
-
SSDEEP
1536:JSSSS6Wq0X/DN/zZBYtRx0jDSYAhexfQQQQQQ0vir9j5tLGhNpl3/Sb5Hh9rGFJT:jfQQQQQQ07
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 5080 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
EXCEL.EXEpid process 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE 5080 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2015届学生毕业设计指导老师安排表.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/5080-132-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmpFilesize
64KB
-
memory/5080-133-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmpFilesize
64KB
-
memory/5080-134-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmpFilesize
64KB
-
memory/5080-135-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmpFilesize
64KB
-
memory/5080-136-0x00007FFC25C10000-0x00007FFC25C20000-memory.dmpFilesize
64KB
-
memory/5080-137-0x00007FFC232B0000-0x00007FFC232C0000-memory.dmpFilesize
64KB
-
memory/5080-138-0x00007FFC232B0000-0x00007FFC232C0000-memory.dmpFilesize
64KB