Analysis
-
max time kernel
500s -
max time network
504s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
13-04-2023 12:31
Static task
static1
Behavioral task
behavioral1
Sample
Export (8).xlsx
Resource
win7-20230220-en
windows7-x64
6 signatures
600 seconds
Behavioral task
behavioral2
Sample
Export (8).xlsx
Resource
win10v2004-20230221-en
windows10-2004-x64
5 signatures
600 seconds
General
-
Target
Export (8).xlsx
-
Size
25KB
-
MD5
ff5ed855aea932d671eb87f5375cadc4
-
SHA1
05100cf6af3cddb1f02f0da0945f8f86b20baae4
-
SHA256
baf53b479418eb6d70249b996f6d76bac2b5d8df2bd3f0d553c728dcbaf2d774
-
SHA512
dcb895c4e5ae19a64fe8fe188a6230b4e933a7c9788b82064cc090bb8d91ab2978390682ec15ae960cc6c4c7e908cad7efb05bd4ca51206f2ad54eea2fe1b51f
-
SSDEEP
768:25C6O6u7fmtHMZSVq2SsKQfe4JssOWnG3M:HYUdeFssJ
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1476 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1476 EXCEL.EXE 1476 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE 1476 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Export (8).xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1476