Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
cb659cd8c2dcc2e61befd439e97a86f8.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cb659cd8c2dcc2e61befd439e97a86f8.xls
Resource
win10v2004-20230220-en
General
-
Target
cb659cd8c2dcc2e61befd439e97a86f8.xls
-
Size
65KB
-
MD5
cb659cd8c2dcc2e61befd439e97a86f8
-
SHA1
7478ffdcfc23afe3be172dd93c833539436eea3a
-
SHA256
9125a526af41499633364638dcaa21492832cffda1a49c74aaa22146d14f3a7d
-
SHA512
6c37da82211c6749ceb973f8965e0e63c6c7de2953b9994c032d901c8383870b24bfb99f1d9a33765466c78ce1fc7bf48f974b4c0c9f9b934171eec0d502ce03
-
SSDEEP
1536:kH32Z38rmjPOtyoVjDGL61EfDlaGGx+HugOapSoOBsPF+ILbo9hXldWb/OA:kq8rmjPOtyoVjDGL61EfDlaGGx+HugOu
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4380 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cb659cd8c2dcc2e61befd439e97a86f8.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50ace6dffc3828806664450317603cd8b
SHA1f0e37629675715dfd37994ab83c05da5e02fb081
SHA25642e323ef3ac267f28064a55d684e35afe53003e1cb68f4fdc7bde0ac170dd325
SHA512eaebb1fb54c230542e9d8dc8f4ff10250919c6d4c6f21f6f774fd680d8d225d0a14646609c286f664f238feff1fc22d12fe27b5222d265e7a3d7751851b93829
-
Filesize
256B
MD5c6b1a5f0fabb13661274b6680a92fb51
SHA1fb4f7039b2ebec3cb4437d95d522525294cadccc
SHA2563187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1
SHA51225138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221