Analysis
-
max time kernel
193s -
max time network
196s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
02-02-2023 14:37
Behavioral task
behavioral1
Sample
b3a8c4c505ea3dc87be0418e739e67f97ea0f64145d62da58402d6932f169a3d.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
b3a8c4c505ea3dc87be0418e739e67f97ea0f64145d62da58402d6932f169a3d.xls
Resource
win10v2004-20221111-en
General
-
Target
b3a8c4c505ea3dc87be0418e739e67f97ea0f64145d62da58402d6932f169a3d.xls
-
Size
520KB
-
MD5
4399815af56868f8cecbb0737fd42c3d
-
SHA1
fcac84d28a413455ec5d12ac04948bcf999d6e87
-
SHA256
b3a8c4c505ea3dc87be0418e739e67f97ea0f64145d62da58402d6932f169a3d
-
SHA512
4e5963042ccbba963cbc8172839305d8c098e1fcb146b6447adeadfcdcda1ed6e77de0d4c3e4c71aa39f93714c42b963c299402c883a24dc45a6a256fd608dcc
-
SSDEEP
12288:LYaFiKXKv02NM0ry+1z85p1WrxOLzPGYYcO:JLKcZyv85nExOfGgO
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1276 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE 1276 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b3a8c4c505ea3dc87be0418e739e67f97ea0f64145d62da58402d6932f169a3d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1276