Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
13-06-2023 06:12
Static task
static1
Behavioral task
behavioral1
Sample
SOƌv/SOƌv.xlsm
Resource
win7-20230220-en
windows7-x64
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
SOƌv/SOƌv.xlsm
Resource
win10v2004-20230220-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
SOƌv/SOƌv.xlsm
-
Size
291KB
-
MD5
a073062733ee985126421be12508fb7b
-
SHA1
6899e30285882d670cf981d960ee8abfb219f737
-
SHA256
3f66d46ee64b9e5adc7dbf7c61802f531e18c34d74dcdc4e30534060ae636416
-
SHA512
866b20ed99df8b239fbbd123b07d560ab3969378c6c81dcc2ca649b0a9a0d475e1c2da7ec6060f42bd442ff6499c1a22773f1f7bc68bf1a6ac3eba1dbc23a717
-
SSDEEP
6144:okkfPy1Jlie1iTaQGlVUmBZYKvuxRo3ssA:7kfPwJAe1iTaQDmrwo3ssA
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5012 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5012 EXCEL.EXE 5012 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE 5012 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5012 wrote to memory of 2132 5012 EXCEL.EXE 82 PID 5012 wrote to memory of 2132 5012 EXCEL.EXE 82
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SOƌv\SOƌv.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2132
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1992