Analysis

  • max time kernel
    105s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-06-2023 16:06

General

  • Target

    07586499.xls

  • Size

    1.7MB

  • MD5

    f939f0754dbf01ab04a9ad14e219a9b2

  • SHA1

    e3812c98288b7d8fa029aad9ba44df7872a2ca9b

  • SHA256

    c8638e2a29455a9f17ae246aca7156fe7346e95a9abe66fd8832ab3ff6a58746

  • SHA512

    d745b03012a5bd3e49819ff8edd49d8eb073f49a1072568892d23c1f307a2f35f5304c36b54dfdfc1bf05bf24c5a145824de35e2db4ca6046a8024fde4a5319e

  • SSDEEP

    49152:kuQ9zPjPyGiTupw1A+cJbm5Qs633AO05:kN52BTYZ+qbm5QBw

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\07586499.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4108

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4108-133-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-134-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-135-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-136-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-137-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-138-0x00007FFDB8590000-0x00007FFDB85A0000-memory.dmp

    Filesize

    64KB

  • memory/4108-139-0x00007FFDB8590000-0x00007FFDB85A0000-memory.dmp

    Filesize

    64KB

  • memory/4108-177-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-178-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-179-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB

  • memory/4108-180-0x00007FFDBADF0000-0x00007FFDBAE00000-memory.dmp

    Filesize

    64KB