Analysis
-
max time kernel
101s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
13-02-2023 14:50
Static task
static1
Behavioral task
behavioral1
Sample
37809.xls
Resource
win7-20221111-en
windows7-x64
17 signatures
150 seconds
Behavioral task
behavioral2
Sample
37809.xls
Resource
win10v2004-20221111-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
37809.xls
-
Size
1.4MB
-
MD5
d6005c0fba6bd3ba323841900e7d14ae
-
SHA1
ad23e1210e42e3f9aa7cc7db5ecb12ccd307991c
-
SHA256
2245421c55b49a002617de64b4251a6102f0b7d5527675284821edb4e6853ad6
-
SHA512
a8096568bb8e79ed514da70b22c5c6208ae8d2c63ba2b69fffdbe41041298abbe0d52b74202fc42f11ca1ec7b7ea751c54c742c36901d45eadcd5cb863558b21
-
SSDEEP
24576:rYV2ruo2Tt6XZx68WQYr2HNlw2Tt6XZxp1eTumvPNs1so4xzGJ:yEz2Tt6ZmVANlw2Tt6ZteTumnNGso4zg
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2072 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\37809.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2072