Analysis
-
max time kernel
136s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23/05/2023, 19:48
Behavioral task
behavioral1
Sample
7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991.xls
Resource
win10v2004-20230220-en
General
-
Target
7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991.xls
-
Size
1.2MB
-
MD5
cf982d8457dfd8a68070bfde5401bc07
-
SHA1
4853fb9e3999a3238cc6d14bf823df43be7b9c0a
-
SHA256
7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991
-
SHA512
977403f4f137ac335a20c45337f9e4531ede4116c75f4a08db6f66f3d05987a8ee621820aeaa070fac2e6a530f1cb425f7c87fd563dcaa65ae10bf4c1679df88
-
SSDEEP
12288:RSAKbpHW9ZFmhBBebEHbCv5PT/pu22d77bMSqkMkuD6nT3ovcUocoFvqmUhmg4uj:7EIneBhHbCvK2Abh4qa5shdE
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4112 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE 4112 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7c6079d7064ec11c061bf34c2b869b9f1d9c257371efe03a76ece54b99d65991.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4112
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89B
MD561ebc5ee9800b6a971da9e648c6b14e8
SHA1f25f45e2e2b57047095157fda900a37b6ea12bb9
SHA256879a5a9734b5bdcb35ae203eb34c82b3341acf947ab189e6e94c26b0b50ed22a
SHA512aba9347c03b4ec144a9edef5abd6fe3a500512565002bc34ffdcda7f736473d5820e0b631238778e6eeeb3d4f53004d66dfffe4284aa45fb1c08bdff63b2a3ba