Analysis
-
max time kernel
138s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2023 08:50
Behavioral task
behavioral1
Sample
8722a38d08f870b55de90a248e0df210.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
8722a38d08f870b55de90a248e0df210.xls
Resource
win10v2004-20230220-en
General
-
Target
8722a38d08f870b55de90a248e0df210.xls
-
Size
131KB
-
MD5
8722a38d08f870b55de90a248e0df210
-
SHA1
bbbc03c06fbb9f6c83bf0dc6ff66617e3ba0e82b
-
SHA256
d8591e8d21df8bca035f818aa0d42a4d2d5a39d4421e2b3d82e1d927babffa7b
-
SHA512
b687cce53bac6b4bf4b925d5fdc7066d746fc5b17977fad413394292c095925da7f712ac14e589e3dc083fac3228db36dbfa91b3f89c0deaa5165c0fee6045be
-
SSDEEP
1536:nAivUOh8icqgnlqKsr3sY8L9/GNfGhtA:nAiMOrcqgnlqKiI+QS
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 544 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 544 EXCEL.EXE 544 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE 544 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8722a38d08f870b55de90a248e0df210.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:544
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57d85916cc26c8a681bc112af9b8243f2
SHA15cf1f7e229058ae613708f84cb8e8551a2ebc50b
SHA256f35b56d654a55a6867b55f96ab14dcab2af243d5aea81ab3dc2189c6768b89c6
SHA512e20721bf94e9dff6a1395651a4101f8a56b61938185b698fd2860cc7f233ad29ff02c7106a94fb7316b043654247a778cceddadc687564706c3397edc03abe28
-
Filesize
256B
MD5c6b1a5f0fabb13661274b6680a92fb51
SHA1fb4f7039b2ebec3cb4437d95d522525294cadccc
SHA2563187033c928e0b968eba0b2ade93ae172fe40093bb6f99ac4b3f8a0d5fd506d1
SHA51225138c9e45282406b41ed01d2dc97da4be0db6cb254b8bac28244990065264390c6514d163f95e32993d91d9c77366de8de26440f51ac873da7ac97feff0d221