Analysis
-
max time kernel
101s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
01-06-2023 07:36
Behavioral task
behavioral1
Sample
5611d86c7c8dc065aa831d18491247e34456e6e846c08526e9c51942b556a653.pdf
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
5611d86c7c8dc065aa831d18491247e34456e6e846c08526e9c51942b556a653.pdf
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
has been verified. However PDF, Jpeg, Docx, .xlsx
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
has been verified. However PDF, Jpeg, Docx, .xlsx
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
decrypted.xlsx
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
decrypted.xlsx
Resource
win10v2004-20230220-en
General
-
Target
has been verified. However PDF, Jpeg, Docx, .xlsx
-
Size
49KB
-
MD5
5d5e9273e693ab3a1bdeb9ba9309f9d2
-
SHA1
9ccc6d25b083f3d85cea9b59adc2e5d803d0e4ec
-
SHA256
2f70b7de0474708798801fdf3bd50bfe54890a60260d631cede70a71ceef55cf
-
SHA512
5fee3a8a9f135dfb26815c46addeca98b762ed16db8f983468c815c0828e0022df2583923a11f9001bbe597798ad99b9b16e8e4cb79b22ddbfbda7d4eb0f6b2c
-
SSDEEP
1536:mpiuDu5GwUgeqXAyqBOdWc30K6doP8BVCK7EO:m0HzQnBOdWckKb8H
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3888 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3888 EXCEL.EXE 3888 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE 3888 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\has been verified. However PDF, Jpeg, Docx, .xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3888