Resubmissions
14-06-2023 17:21
230614-vw6wlabh9t 114-06-2023 15:25
230614-st3eaaaf63 114-06-2023 15:11
230614-skydzaaf7t 114-06-2023 15:08
230614-sjbhtaae36 1Analysis
-
max time kernel
105s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2023 15:25
Static task
static1
Behavioral task
behavioral1
Sample
toCheck.xlsx
Resource
win10v2004-20230220-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
toCheck.xlsx
-
Size
5.2MB
-
MD5
d58c7369c34cd53ff2fb0f76fe059756
-
SHA1
e9d2f46c9bf3d82ec9b744fa5aebc9b58f71bb55
-
SHA256
79c1cc9bac58aa158b79e021830f158e53e1867aa3d2192aa0ffd71d008f10f4
-
SHA512
a67e26b425eff318931bf80e0e4f47586dc2ea7a320a8246f88d108cfe056587d2f3e007db9990df07758143ef58a3688f0a56fc41200a04fcd5a55cec88050d
-
SSDEEP
98304:Lp5XZT7sP3WxQSHS72DPUG08GzYr4P9yl8TlYabZv98YkvTGDq9A3Cksmw:V5JT7ZQSHSSwb8X8P9m83Nvavu/Pw
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4120 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4120 EXCEL.EXE 4120 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE 4120 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\toCheck.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4120