Resubmissions

14-06-2023 17:21

230614-vw6wlabh9t 1

14-06-2023 15:25

230614-st3eaaaf63 1

14-06-2023 15:11

230614-skydzaaf7t 1

14-06-2023 15:08

230614-sjbhtaae36 1

Analysis

  • max time kernel
    105s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2023 15:25

General

  • Target

    toCheck.xlsx

  • Size

    5.2MB

  • MD5

    d58c7369c34cd53ff2fb0f76fe059756

  • SHA1

    e9d2f46c9bf3d82ec9b744fa5aebc9b58f71bb55

  • SHA256

    79c1cc9bac58aa158b79e021830f158e53e1867aa3d2192aa0ffd71d008f10f4

  • SHA512

    a67e26b425eff318931bf80e0e4f47586dc2ea7a320a8246f88d108cfe056587d2f3e007db9990df07758143ef58a3688f0a56fc41200a04fcd5a55cec88050d

  • SSDEEP

    98304:Lp5XZT7sP3WxQSHS72DPUG08GzYr4P9yl8TlYabZv98YkvTGDq9A3Cksmw:V5JT7ZQSHSSwb8X8P9m83Nvavu/Pw

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\toCheck.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4120

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4120-133-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-134-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-135-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-136-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-137-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-138-0x00007FFA089B0000-0x00007FFA089C0000-memory.dmp

    Filesize

    64KB

  • memory/4120-139-0x00007FFA089B0000-0x00007FFA089C0000-memory.dmp

    Filesize

    64KB

  • memory/4120-174-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-175-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-176-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB

  • memory/4120-177-0x00007FFA0AB70000-0x00007FFA0AB80000-memory.dmp

    Filesize

    64KB