Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2023 09:04
Static task
static1
Behavioral task
behavioral1
Sample
NEW ORDER IMP.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
NEW ORDER IMP.xls
Resource
win10v2004-20230220-en
General
-
Target
NEW ORDER IMP.xls
-
Size
1.3MB
-
MD5
beff0a43acfbdadee4b778952a27cc28
-
SHA1
a4598522d27ec5027c3e9b29690c8e6392e5fe1a
-
SHA256
dc54de15c8615d5523ba7ef2debf9a93ff76661f5c2f6e6d9f5cb594e753ee3e
-
SHA512
8d376e2ae51ea9652ed27ed9b88486949a909dd23f96ecaa28b4c54e1a664cd648629afc326b4c8e18b6195311ddc1e5b832216de9be6504a1c53f9cb45bd9e6
-
SSDEEP
24576:5LKKWQmmav30xl+MXUl3bVt3bVE+MXUu9O3bVf+MXUu9t3bVr1FYVCnSGmV:5LKvQmmQ30b+MXe3bVt3bVE+MXV9O3bc
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4388 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE 4388 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NEW ORDER IMP.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4388
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD5fdebfd1c0d731bf56a398abeb7f221a5
SHA17864f45ca62bc727a332ded751442b99265e065f
SHA25619b8c1d2bffb4feac1bdeb2fb14d79ac6d50b4ceb566c1f3c8e233a088c30eb2
SHA5125747fd24d92139f6cfec2ee7832ab44af1daee3b1eedb98fec07e521e69a769ab1eebcc91feb94fe0292835bd32c034eca545b7422e75fb67d3c3653ae76d83e