Analysis
-
max time kernel
100s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 14:51
Static task
static1
Behavioral task
behavioral1
Sample
New order.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
New order.xls
Resource
win10v2004-20230220-en
General
-
Target
New order.xls
-
Size
104KB
-
MD5
866804d9e628e60825b840b148d3d9ff
-
SHA1
77a6bc49fc054531aa1ff027ae776902d09f8016
-
SHA256
7220e36652118083eb851f8f1ed7973ef4526667ef5a05869e330a25183f29d3
-
SHA512
f2b7b9619593eb610671d83d3ef42a9ac62998f410adc005becf4e4c40ec75eaab815c0e1197fe36062dd173d854f653f6c603ae478435e368a9740e8e87c917
-
SSDEEP
1536:s58Tg07U9AY7RAscWbOw3RYTTt3zgVIlAMg2V6w3c4PZjrPK941wQJ:sQFg9AoRAscW33RE3z6Iq6V6WPZjrP
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4536 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4536 EXCEL.EXE 4536 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE 4536 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\New order.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4536