Analysis
-
max time kernel
130s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
03-01-2023 02:20
Static task
static1
Behavioral task
behavioral1
Sample
de2ae1c56c5927114fd7babee4fb3016157772e467ae81a0cafab836e63feb2d.xlsx
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
de2ae1c56c5927114fd7babee4fb3016157772e467ae81a0cafab836e63feb2d.xlsx
Resource
win10v2004-20221111-en
General
-
Target
de2ae1c56c5927114fd7babee4fb3016157772e467ae81a0cafab836e63feb2d.xlsx
-
Size
2.9MB
-
MD5
433df1e029f9f2d8edb5f3c403ced9f1
-
SHA1
1bc7225860817e4d410310aa3818ddf35416b654
-
SHA256
de2ae1c56c5927114fd7babee4fb3016157772e467ae81a0cafab836e63feb2d
-
SHA512
717286292c2c83b3b7e9b6546def138418c0305ddc6e452041fdf1b86ac95372c0aba16e503803df688a5cfd410cde05cb423429fa38bc70997f6ecdf9f5ccc9
-
SSDEEP
49152:Wcaqw8fkQUpAK2dNR6ImTBdhV7w7L4ZjLJHbZckkG30+q8cChlP+2k8gKocCV5D3:DaqzfkQUpAK2dNR6ImTBdhV7w7EZjLJs
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 424 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE 424 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\de2ae1c56c5927114fd7babee4fb3016157772e467ae81a0cafab836e63feb2d.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:424