Analysis

  • max time kernel
    101s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-02-2023 14:50

General

  • Target

    37809.xls

  • Size

    1.4MB

  • MD5

    d6005c0fba6bd3ba323841900e7d14ae

  • SHA1

    ad23e1210e42e3f9aa7cc7db5ecb12ccd307991c

  • SHA256

    2245421c55b49a002617de64b4251a6102f0b7d5527675284821edb4e6853ad6

  • SHA512

    a8096568bb8e79ed514da70b22c5c6208ae8d2c63ba2b69fffdbe41041298abbe0d52b74202fc42f11ca1ec7b7ea751c54c742c36901d45eadcd5cb863558b21

  • SSDEEP

    24576:rYV2ruo2Tt6XZx68WQYr2HNlw2Tt6XZxp1eTumvPNs1so4xzGJ:yEz2Tt6ZmVANlw2Tt6ZteTumnNGso4zg

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\37809.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2072

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2072-132-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-133-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-134-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-135-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-136-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-137-0x00007FF84BCD0000-0x00007FF84BCE0000-memory.dmp

    Filesize

    64KB

  • memory/2072-138-0x00007FF84BCD0000-0x00007FF84BCE0000-memory.dmp

    Filesize

    64KB

  • memory/2072-140-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-141-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-142-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB

  • memory/2072-143-0x00007FF84E110000-0x00007FF84E120000-memory.dmp

    Filesize

    64KB