Analysis
-
max time kernel
99s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2023, 11:47
Static task
static1
Behavioral task
behavioral1
Sample
2023X03X02.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2023X03X02.xls
Resource
win10v2004-20230220-en
General
-
Target
2023X03X02.xls
-
Size
188KB
-
MD5
5c174a8c932844428c54877686885bc6
-
SHA1
63b24045a70890373f79850c8e75e58642ff01e2
-
SHA256
cfc9ec5acebd081c1f16545360fcf4ec7067337ac0215f5c1097d5b7a42aaee0
-
SHA512
ba3c5e6561bbb60e0a055c31192a0cc8f04bdb0c5beff6639b0acf3f49c79aa4cca6d40c68babcf5f3eb09f1b6b823149a26fa73d1e2f72408b2c8cece332b5a
-
SSDEEP
3072:IkZ+RwPONXoRjDhIcp0fDlaGGx+cL26nA/QvqpN2TwqHI9:lZ+RwPONXoRjDhIcp0fDlavx+W26nA4D
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1752 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1752 EXCEL.EXE 1752 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE 1752 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2023X03X02.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1752