Analysis

  • max time kernel
    101s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-05-2023 11:45

General

  • Target

    SecuriteInfo.com.HEUR.22305.31534.xls

  • Size

    117KB

  • MD5

    5ba7487b338dd0b063dd6ed7822f25da

  • SHA1

    5562f593513b282ec520950f9ed3b753ba6892df

  • SHA256

    db6f93f8ce2517014b8f47058a2a401461b55a2bf8fd3d4601459eb15b8e0ed5

  • SHA512

    736324ad68b35fd20a2d27bf2df6c8b1c912f5a99d788820261fb8a845ed18fc2b2df5ba09a4acc90e9df340ab797eea9ba4e269bc8f3944fda77dc8bb81fec7

  • SSDEEP

    3072:q5u5AakoEUHks0sl4RLivCrDbsjNw2cM0NtJQpgRLaR6:t7HjfNwu0RQoLN

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.HEUR.22305.31534.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4708

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4708-133-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-135-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-134-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-136-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-137-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-138-0x00007FFD0F6D0000-0x00007FFD0F6E0000-memory.dmp
    Filesize

    64KB

  • memory/4708-139-0x00007FFD0F6D0000-0x00007FFD0F6E0000-memory.dmp
    Filesize

    64KB

  • memory/4708-160-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-159-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-161-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB

  • memory/4708-162-0x00007FFD11DF0000-0x00007FFD11E00000-memory.dmp
    Filesize

    64KB