Analysis
-
max time kernel
109s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
18/05/2023, 01:56
Static task
static1
Behavioral task
behavioral1
Sample
47116AF96AA033477617B2B06BBE5B409B7702169F14A7ABFDF7AE8517EE4E24.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
47116AF96AA033477617B2B06BBE5B409B7702169F14A7ABFDF7AE8517EE4E24.xls
Resource
win10v2004-20230220-en
General
-
Target
47116AF96AA033477617B2B06BBE5B409B7702169F14A7ABFDF7AE8517EE4E24.xls
-
Size
1.2MB
-
MD5
b877b1ff6a16f737e2075ec91e67b45a
-
SHA1
2147bfaec1487d080ec14103a20d89da1c7589fe
-
SHA256
47116af96aa033477617b2b06bbe5b409b7702169f14a7abfdf7ae8517ee4e24
-
SHA512
52dd4c3b5926411776f9cbed84118455a5109f203dae1486cb44a581794f62e6154a632bedc5f68db5ba10960da6fb72925051b285460e1c77655414c8d2f791
-
SSDEEP
24576:OLKeBXtHlxpWQmmav30xTBj/tHlxNWQmmav30x/h6FwEzuAaBk0R:OLKeT74QmmQ30l5Z7sQmmQ30lh6KSuAC
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1860 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1860 EXCEL.EXE 1860 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE 1860 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\47116AF96AA033477617B2B06BBE5B409B7702169F14A7ABFDF7AE8517EE4E24.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1860
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD5c548d879c9e79f360bb80d4c1cfeb99a
SHA1f1eee2951068df3f1062d1e070ca5f9c75a0c7e3
SHA256bd8211c1827c4f01a342c714844b9901552f34596700f7303fb1812ded9d22cb
SHA51249e08b3545b90d5595815bf0746bd31d9f52cd7ad1a751469bc80c9c1a83bc4e294f6f53bda1d82b32da1fceef1fa41e9942e8d3630b63e44b8e46e9e7191581
-
Filesize
577KB
MD581acced1bbe4a6804927e2e83e1fe1ea
SHA1d5a27891d163974ecdf9b5205b16e5a491921d5c
SHA2567743847302b1b15e7c3391d7ede58bdb21bfc96348e6c59f88b72a65c0f52b49
SHA512e2240e2d042ddad2fcd838e0aaf298e0ee449e6cb3698af030c39d001f30903f0cde4850cb7f3b8b4e0307c67a9f4e77639bf6c4c1223661cd098d66a97315de