Analysis

  • max time kernel
    136s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23/05/2023, 19:48

General

  • Target

    7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991.xls

  • Size

    1.2MB

  • MD5

    cf982d8457dfd8a68070bfde5401bc07

  • SHA1

    4853fb9e3999a3238cc6d14bf823df43be7b9c0a

  • SHA256

    7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991

  • SHA512

    977403f4f137ac335a20c45337f9e4531ede4116c75f4a08db6f66f3d05987a8ee621820aeaa070fac2e6a530f1cb425f7c87fd563dcaa65ae10bf4c1679df88

  • SSDEEP

    12288:RSAKbpHW9ZFmhBBebEHbCv5PT/pu22d77bMSqkMkuD6nT3ovcUocoFvqmUhmg4uj:7EIneBhHbCvK2Abh4qa5shdE

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4112

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\G1ORIWBN\psi-data-excel-version[1].xml

          Filesize

          89B

          MD5

          61ebc5ee9800b6a971da9e648c6b14e8

          SHA1

          f25f45e2e2b57047095157fda900a37b6ea12bb9

          SHA256

          879a5a9734b5bdcb35ae203eb34c82b3341acf947ab189e6e94c26b0b50ed22a

          SHA512

          aba9347c03b4ec144a9edef5abd6fe3a500512565002bc34ffdcda7f736473d5820e0b631238778e6eeeb3d4f53004d66dfffe4284aa45fb1c08bdff63b2a3ba

        • memory/4112-133-0x00007FFB7E0D0000-0x00007FFB7E0E0000-memory.dmp

          Filesize

          64KB

        • memory/4112-135-0x00007FFB7E0D0000-0x00007FFB7E0E0000-memory.dmp

          Filesize

          64KB

        • memory/4112-134-0x00007FFB7E0D0000-0x00007FFB7E0E0000-memory.dmp

          Filesize

          64KB

        • memory/4112-136-0x00007FFB7E0D0000-0x00007FFB7E0E0000-memory.dmp

          Filesize

          64KB

        • memory/4112-137-0x00007FFB7E0D0000-0x00007FFB7E0E0000-memory.dmp

          Filesize

          64KB

        • memory/4112-138-0x00007FFB7B970000-0x00007FFB7B980000-memory.dmp

          Filesize

          64KB

        • memory/4112-139-0x00007FFB7B970000-0x00007FFB7B980000-memory.dmp

          Filesize

          64KB