Analysis

  • max time kernel
    140s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 19:36

General

  • Target

    3352d8d6c5acb1dbb5a0b9eab250c344.xls

  • Size

    140KB

  • MD5

    3352d8d6c5acb1dbb5a0b9eab250c344

  • SHA1

    08f5f80fd164152fc1dc9f70b77e4e7651820c98

  • SHA256

    0996805f4f8b09a435b7e9bdf28bcaaa5121fba41028fd35a509a3ea4ca91180

  • SHA512

    76ff7f8f04d9c582872597d2ea629afcca68ff7e473aea167e253e37e624e1f30c6109c9983a865acda1eda400dfbfb05b56168249f002805be46ca0b2fd7bda

  • SSDEEP

    3072:orxEtjPOtioVjDGUU1qfDlaGGx+cL2QnAiWpnUXB7pqkCkG+jrU91z+M/7OmmwUZ:ixEtjPOtioVjDGUU1qfDlavx+W2QnAXi

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3352d8d6c5acb1dbb5a0b9eab250c344.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4584

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4584-132-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-133-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-134-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-135-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-136-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-137-0x00007FF9DE600000-0x00007FF9DE610000-memory.dmp

    Filesize

    64KB

  • memory/4584-138-0x00007FF9DE600000-0x00007FF9DE610000-memory.dmp

    Filesize

    64KB

  • memory/4584-140-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-141-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-142-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB

  • memory/4584-143-0x00007FF9E06B0000-0x00007FF9E06C0000-memory.dmp

    Filesize

    64KB