Analysis
-
max time kernel
168s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
02-04-2023 22:50
Behavioral task
behavioral1
Sample
zakupki.rosneft.ru_files_zakup_345_2019-11_527228_docs__d0_9a_d0_a7_d0_9e.xlsm
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
zakupki.rosneft.ru_files_zakup_345_2019-11_527228_docs__d0_9a_d0_a7_d0_9e.xlsm
Resource
win10v2004-20230220-en
General
-
Target
zakupki.rosneft.ru_files_zakup_345_2019-11_527228_docs__d0_9a_d0_a7_d0_9e.xlsm
-
Size
21KB
-
MD5
719679b5d1c3bcc88335f809016cc0fd
-
SHA1
2b902371b099be37254bfa4172b1c1c6d62f3f7b
-
SHA256
2b0664d00d69b778137d7209cef49d4529e8563c1b820946a06351e1fe68228d
-
SHA512
7352852c70f1f0409706a481143f5c82716314e519666c450aab4e8e6dabdbb78914c880703eda30f21d70cfb85485074498d4658516c250e7c18d3e52384926
-
SSDEEP
384:HpjRIU45YzFn7CU7cBoZGghUCSZTk9699zmJVU2cE0kY5g0QgBdS:HqY57D2ogKD6bai5VQgBo
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1464 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE 1464 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\zakupki.rosneft.ru_files_zakup_345_2019-11_527228_docs__d0_9a_d0_a7_d0_9e.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1464