Analysis
-
max time kernel
101s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
11af5e8f8d0f4b42c4100ca420b718ca0a76327d40f0760f798e73d2873e5bf5.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
11af5e8f8d0f4b42c4100ca420b718ca0a76327d40f0760f798e73d2873e5bf5.xls
Resource
win10v2004-20220901-en
General
-
Target
11af5e8f8d0f4b42c4100ca420b718ca0a76327d40f0760f798e73d2873e5bf5.xls
-
Size
38KB
-
MD5
22505478e26bd1bb8d0bcb5a5d1842a8
-
SHA1
3cb27257845d996a37c74b3f016dae185e740fcf
-
SHA256
11af5e8f8d0f4b42c4100ca420b718ca0a76327d40f0760f798e73d2873e5bf5
-
SHA512
2f7f52d56af799ddfec10a58748fbf1b1ad6504bcbf3888d88d1816feceb8ba0fb7858b4f5fb73f09d22d88ba1d122b9263c490eb7659bce4d1f919ac2f620b6
-
SSDEEP
768:MI33KyT2tQsD3y7R2H092zRI7LNaH5RuKM:j33KyT2tQsD3yimLcrM
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3736 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE 3736 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\11af5e8f8d0f4b42c4100ca420b718ca0a76327d40f0760f798e73d2873e5bf5.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3736