Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2023 17:43
Behavioral task
behavioral1
Sample
3c9adef0b3bc17014e471a1fb64f45b1dd58e1ac7156182c97389d28d7425be9.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
3c9adef0b3bc17014e471a1fb64f45b1dd58e1ac7156182c97389d28d7425be9.xls
Resource
win10v2004-20221111-en
General
-
Target
3c9adef0b3bc17014e471a1fb64f45b1dd58e1ac7156182c97389d28d7425be9.xls
-
Size
54KB
-
MD5
8f3cd5707ae29ddf8f1b4b78548c80b0
-
SHA1
0ed1d7f027db46575dacc183a0e257e6e927712e
-
SHA256
3c9adef0b3bc17014e471a1fb64f45b1dd58e1ac7156182c97389d28d7425be9
-
SHA512
8d2c44eae30659efaa1f968f6bb6bb5296e4c014d2a77fe895a18be02aac38c6dbd4e684a25d34267201a148aafe2b584bc541c92db29b91858981cfc443a7fa
-
SSDEEP
1536:cokdvxHlcaQPy0iWYOcG4BDhnxD28ixQ7uDphYHceXVhca+fMHLtyeGxcl8/dgKl:cokdvxHlcaAy0iWYOcG4BDhnxD28ixQb
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4884 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
EXCEL.EXEpid process 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3c9adef0b3bc17014e471a1fb64f45b1dd58e1ac7156182c97389d28d7425be9.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/4884-132-0x00007FFDDA550000-0x00007FFDDA560000-memory.dmpFilesize
64KB
-
memory/4884-133-0x00007FFDDA550000-0x00007FFDDA560000-memory.dmpFilesize
64KB
-
memory/4884-134-0x00007FFDDA550000-0x00007FFDDA560000-memory.dmpFilesize
64KB
-
memory/4884-135-0x00007FFDDA550000-0x00007FFDDA560000-memory.dmpFilesize
64KB
-
memory/4884-136-0x00007FFDDA550000-0x00007FFDDA560000-memory.dmpFilesize
64KB
-
memory/4884-137-0x00007FFDD8040000-0x00007FFDD8050000-memory.dmpFilesize
64KB
-
memory/4884-138-0x00007FFDD8040000-0x00007FFDD8050000-memory.dmpFilesize
64KB