Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2023 07:21
Static task
static1
Behavioral task
behavioral1
Sample
ddd.xlsb
Resource
win7-20230220-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
ddd.xlsb
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
ddd.xlsb
-
Size
12KB
-
MD5
0e65c589e0c6edffb3b305e7595a271b
-
SHA1
53ef35185fa07082cb278e7ef52645a21fbbe058
-
SHA256
83d171ffcf9f88d4e1408e34ef2829c849b90748e1b7b2da0679d6ee39cd958f
-
SHA512
0a5c612b0100a74ef04977a91f552ccad1070d436fbbf6a25b2967d16b13f35167ae96baed9961fe88dcf5eda8b1d3a12d13665f8fff59a2f07e8e76f79b4cfc
-
SSDEEP
192:0TUa42Szpq9H5FEBPJ2Z3KmFOt+FnzKqiWlw0QSFMaxon0YSntQ:ZaHiBPJ2cEnz3lwduMaxon0i
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4364 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4364 EXCEL.EXE 4364 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE 4364 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ddd.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4364