Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01/03/2023, 07:04
Behavioral task
behavioral1
Sample
9d79dad075010470e7714436f2829a66.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
9d79dad075010470e7714436f2829a66.xls
Resource
win10v2004-20230220-en
General
-
Target
9d79dad075010470e7714436f2829a66.xls
-
Size
290KB
-
MD5
9d79dad075010470e7714436f2829a66
-
SHA1
66881f49683b71e773c422981dcb3c58f965202a
-
SHA256
37f61f63629f01633165af6d5511c23849260fea49ea63ee949f70820fcb451f
-
SHA512
3e9329ea8f510108d9eb01dd04027009bb51249e4d7d96461993e60f716d749a8ebb272a220206564e77a4bee534a38b28e869ba294f7ec425f84cff56bda540
-
SSDEEP
6144:Ck3hbdlylKsgqopeJBWhZFVE+ldZ4AacEcK5pKh8ib3j2vij+L3ft8etr0a5M7ci:0cS5p+b3jSA+LV3rTM+BFJk
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 988 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 988 EXCEL.EXE 988 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE 988 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9d79dad075010470e7714436f2829a66.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ca0b8b4c74695b9f7e7b1e9e7664beed
SHA141406fcf9a61b3a5bb14e5517dfa415d16df41ff
SHA256f25e49cfce9704c6f147b7ef8aa4336899119918332c210eac8dbcc11a85299e
SHA5127e417a013e4afaceaf6d89bebfd2ec0c0d131d941b16a7c3d12c9fa1b7bf8548ee66053f845838462e3aeabe1b2017484d2308f57aa3c786de0a01e5d9ad5d55
-
Filesize
256B
MD5c6b1a5f0fabb13661274b6680a92fb51
SHA1fb4f7039b2ebec3cb4437d95d522525294cadccc
SHA2563187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1
SHA51225138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221