Analysis
-
max time kernel
98s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2023 01:00
Static task
static1
Behavioral task
behavioral1
Sample
f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls
Resource
win10v2004-20230220-en
General
-
Target
f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls
-
Size
1.2MB
-
MD5
18c55c7221e979c7dfd36a8fbb9e7b81
-
SHA1
169c0f765fde44cddb8eca882b0b6a15e7f70536
-
SHA256
f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99
-
SHA512
fb4692390470a50598d72c95f844dce1715ab6c9a630682883756c9e66baf53d84ed41ff423f228644d738ac4405c61aed14006cba27f66d40f36e13ac79ed8d
-
SSDEEP
24576:SLKfBftHlxFWQmmav30xoBb7tHlx/WQmmav30xA6Ff0BPwkDvG8ffqRv57:SLKfn7EQmmQ30S9N7uQmmQ30K6B2PwkE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3096 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3096 EXCEL.EXE 3096 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE 3096 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD54da86984b73a3de269d5c4267a993b3a
SHA16011a73f116538923f7f1ea9ccd42984fd6110db
SHA25690004484d7ee2139ca1a19d575106162fa675a558ec4e255291afe0fc135c191
SHA512fc8b66e41d54f5542947851d93f2b198978977a54eae99b78f68fa1301deea5a829726138f4e524b55c3c0dd980f826f68c29148b901fd7f7c820f254dc787c8
-
Filesize
577KB
MD5d3b4e7d83da7e1ee0106a097b6dcfb96
SHA1534c16799ce03878b5c1adcaec0544714cf328a1
SHA2564ba2df5524662ffb116232fce68c26a39c67136f3238145b92c84ed9afb584ac
SHA5124e6406808d18b5091c1f39d7d3cd56ea1bcd6d002bb16aa7dbe57ee8ecaf09716342df6d6a44c961c95d1441931d2f394b08ff27364968d13abdbccbaded1dd5