Analysis
-
max time kernel
135s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2022 07:10
Behavioral task
behavioral1
Sample
9ef8631578196747fe6198a97c0ceb20.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9ef8631578196747fe6198a97c0ceb20.xls
Resource
win10v2004-20221111-en
General
-
Target
9ef8631578196747fe6198a97c0ceb20.xls
-
Size
72KB
-
MD5
9ef8631578196747fe6198a97c0ceb20
-
SHA1
5eebe8e0a1c50e54391618b83a917e7f32b18bf8
-
SHA256
5a21120c9bd779786888f9d4d2a138836e627f001dbacc80c2b035ff7d198715
-
SHA512
04c7c0ecf6ad26546155218886188d5fc444c2067f9f28246094ad15fb5e4f1b0026fbc220ca18a2f34ba6f7629d371487b7dacfdbd6e4955fa64009e012a62f
-
SSDEEP
1536:AT3k3hbdlylKsgqopeJBWhZFGkE+cL2NdAsZYsztEHhy4kot7Ty1YBu:Azk3hbdlylKsgqopeJBWhZFGkE+cL2Nr
Malware Config
Extracted
http://fikima.com/axel.exe
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 792 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE 792 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9ef8631578196747fe6198a97c0ceb20.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:792