Analysis

  • max time kernel
    98s
  • max time network
    130s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-03-2023 01:00

General

  • Target

    f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls

  • Size

    1.2MB

  • MD5

    18c55c7221e979c7dfd36a8fbb9e7b81

  • SHA1

    169c0f765fde44cddb8eca882b0b6a15e7f70536

  • SHA256

    f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99

  • SHA512

    fb4692390470a50598d72c95f844dce1715ab6c9a630682883756c9e66baf53d84ed41ff423f228644d738ac4405c61aed14006cba27f66d40f36e13ac79ed8d

  • SSDEEP

    24576:SLKfBftHlxFWQmmav30xoBb7tHlx/WQmmav30xA6Ff0BPwkDvG8ffqRv57:SLKfn7EQmmQ30S9N7uQmmQ30K6B2PwkE

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f8f36bc29327d52d324ff8d2b7f332d0e00f1991e96406aae74ded560631cc99.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:3096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4489A7CB.emf

    Filesize

    34KB

    MD5

    4da86984b73a3de269d5c4267a993b3a

    SHA1

    6011a73f116538923f7f1ea9ccd42984fd6110db

    SHA256

    90004484d7ee2139ca1a19d575106162fa675a558ec4e255291afe0fc135c191

    SHA512

    fc8b66e41d54f5542947851d93f2b198978977a54eae99b78f68fa1301deea5a829726138f4e524b55c3c0dd980f826f68c29148b901fd7f7c820f254dc787c8

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\Content.MSO\4C5B8E72.emf

    Filesize

    577KB

    MD5

    d3b4e7d83da7e1ee0106a097b6dcfb96

    SHA1

    534c16799ce03878b5c1adcaec0544714cf328a1

    SHA256

    4ba2df5524662ffb116232fce68c26a39c67136f3238145b92c84ed9afb584ac

    SHA512

    4e6406808d18b5091c1f39d7d3cd56ea1bcd6d002bb16aa7dbe57ee8ecaf09716342df6d6a44c961c95d1441931d2f394b08ff27364968d13abdbccbaded1dd5

  • memory/3096-139-0x00007FFD3EAA0000-0x00007FFD3EAB0000-memory.dmp

    Filesize

    64KB

  • memory/3096-136-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-137-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-138-0x00007FFD3EAA0000-0x00007FFD3EAB0000-memory.dmp

    Filesize

    64KB

  • memory/3096-133-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-134-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-135-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-188-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-189-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-190-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB

  • memory/3096-191-0x00007FFD40D10000-0x00007FFD40D20000-memory.dmp

    Filesize

    64KB