Analysis

  • max time kernel
    500s
  • max time network
    504s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-04-2023 12:31

General

  • Target

    Export (8).xlsx

  • Size

    25KB

  • MD5

    ff5ed855aea932d671eb87f5375cadc4

  • SHA1

    05100cf6af3cddb1f02f0da0945f8f86b20baae4

  • SHA256

    baf53b479418eb6d70249b996f6d76bac2b5d8df2bd3f0d553c728dcbaf2d774

  • SHA512

    dcb895c4e5ae19a64fe8fe188a6230b4e933a7c9788b82064cc090bb8d91ab2978390682ec15ae960cc6c4c7e908cad7efb05bd4ca51206f2ad54eea2fe1b51f

  • SSDEEP

    768:25C6O6u7fmtHMZSVq2SsKQfe4JssOWnG3M:HYUdeFssJ

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Export (8).xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1476

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1476-133-0x00007FFCE28F0000-0x00007FFCE2900000-memory.dmp

    Filesize

    64KB

  • memory/1476-134-0x00007FFCE28F0000-0x00007FFCE2900000-memory.dmp

    Filesize

    64KB

  • memory/1476-135-0x00007FFCE28F0000-0x00007FFCE2900000-memory.dmp

    Filesize

    64KB

  • memory/1476-136-0x00007FFCE28F0000-0x00007FFCE2900000-memory.dmp

    Filesize

    64KB

  • memory/1476-137-0x00007FFCE28F0000-0x00007FFCE2900000-memory.dmp

    Filesize

    64KB

  • memory/1476-138-0x00007FFCE00F0000-0x00007FFCE0100000-memory.dmp

    Filesize

    64KB

  • memory/1476-139-0x00007FFCE00F0000-0x00007FFCE0100000-memory.dmp

    Filesize

    64KB