Analysis
-
max time kernel
100s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2023, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
NEW PO#10123.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NEW PO#10123.xls
Resource
win10v2004-20230220-en
General
-
Target
NEW PO#10123.xls
-
Size
1.2MB
-
MD5
29e47e965aac7474d30b61f1c0889eb3
-
SHA1
fb752bc267f366a95afe4ef6df9cfa335113983e
-
SHA256
1008f41fbb9f5f59b36e40fe285c18f0ead78d68ef4bfa630123ee9cd2629729
-
SHA512
da3169dd3c6626033d17c19c59b0af547dd2c02b16abf4dc385908dd90eb07c780c8dfffac93e37d621349cc1d401ed1027b0c9b1128f5716243ad1b7dfa4b37
-
SSDEEP
24576:WLKgBUWQmmav30xVBLWQmmav30xfyWQmmav30xkB7oWQmmav30xV6EE15irKuypT:WLKgBpQmmQ30rUQmmQ30N3QmmQ306l9d
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2044 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2044 EXCEL.EXE 2044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NEW PO#10123.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2044
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD57c9bf039ac5d88302d99c6ca3811cdab
SHA12a0037ccf645e92103874e7ecc1ea4b2c5163000
SHA25612d80fdc858b2ab624341ad4c5d83269e9f0927811fafd58ff2f94c83dafad3d
SHA51253b2b3251fbd6cf93c5ec677f75e8502385002e1b37acd5d85902731bd41cba4457e896560a977f61aec00f72088f66e3d8ef171855e234f923b300d2f12a47c
-
Filesize
34KB
MD5f73a3efe342adfa0702f96aa3701620a
SHA1470a70e344798253fe37d5dd2c6d5b36de645867
SHA256d3a45bc30791fb3eace3667f5a42281ba030145dd744dce24e4856486ebe53ac
SHA512372e98abe72bc80ce5013c154713e98de1bc6db954d27945e1bc0bfdd5f394846b84c19ab50f71d1626749790972d9ae7907541fd8bffff93bb85375d9cff9cb