Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 22:49
Behavioral task
behavioral1
Sample
actuary.com.au_wp-content_uploads_rvdata.xlsm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
actuary.com.au_wp-content_uploads_rvdata.xlsm
Resource
win10v2004-20230220-en
General
-
Target
actuary.com.au_wp-content_uploads_rvdata.xlsm
-
Size
100KB
-
MD5
eb2d79e5188ed7a45453e520d7ee70bd
-
SHA1
ac637311c2649e33d777c554008c098ce126de70
-
SHA256
7262af42af0b925d27f52a670c1efd5f9b40db84f1ca6f53a3c0308859c4050a
-
SHA512
863418064fe13a868e516e7fc9ba0001de235c140b673fe0a43ac58b4afa181d71b28f659aa46ac5cf8f4055c62011213aa65007fef6d3f2aa0c4ff6c23b367e
-
SSDEEP
1536:3KR0q69GPUG+t2QDNe6uI48RcLRuwQMA9w4LI8xEfVTUenadEk/PARu0CGoHgp:6RABtPwtZuTLIEaAN/P6unGvp
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4380 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4380 EXCEL.EXE 4380 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE 4380 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4380 wrote to memory of 4056 4380 EXCEL.EXE 85 PID 4380 wrote to memory of 4056 4380 EXCEL.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\actuary.com.au_wp-content_uploads_rvdata.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4056
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1592