Analysis
-
max time kernel
123s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
21-03-2023 12:39
Static task
static1
Behavioral task
behavioral1
Sample
请按顺序 静心完整阅读/github 中国程序员邮箱采集/github 中国程序员邮箱汇总 6005个.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
请按顺序 静心完整阅读/github 中国程序员邮箱采集/github 中国程序员邮箱汇总 6005个.xlsx
Resource
win10v2004-20230221-en
Behavioral task
behavioral3
Sample
请按顺序 静心完整阅读/github 中国程序员邮箱采集/~$github 中国程序员邮箱汇总 6005个.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
请按顺序 静心完整阅读/github 中国程序员邮箱采集/~$github 中国程序员邮箱汇总 6005个.xlsx
Resource
win10v2004-20230220-en
General
-
Target
请按顺序 静心完整阅读/github 中国程序员邮箱采集/github 中国程序员邮箱汇总 6005个.xlsx
-
Size
107KB
-
MD5
888e68db4522fba4ccbfabb4724aa8f9
-
SHA1
afaf55865e3eda2357d86de9a82951c07304c84e
-
SHA256
2198ab62c65b3e3db45f6bc9ee05ba5189d15a8a05b0497aa7663ce91d65aae9
-
SHA512
0abf339b1a81ee5d30ae65e6f36bc39ba74b1be9c9a002f974fa144e99218072d5cf107e5aab4885634289b3caf7f3cb712342e6db1f06a595ab9027d61d925a
-
SSDEEP
3072:f854autFeUWLoc2EXWgbTWC6CFbdkjga6IAhKvt2r8ib:f8OwXWKTWCXaWhG0rp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1604 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1604 EXCEL.EXE 1604 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE 1604 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\请按顺序 静心完整阅读\github 中国程序员邮箱采集\github 中国程序员邮箱汇总 6005个.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1604