Analysis
-
max time kernel
101s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
16-06-2023 11:19
Static task
static1
Behavioral task
behavioral1
Sample
Payment Application.xls
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Payment Application.xls
Resource
win10v2004-20230220-en
General
-
Target
Payment Application.xls
-
Size
3.0MB
-
MD5
47bbcc7603e9979b6dd4e9b4a50042f3
-
SHA1
ad926408828c4798c897a3eb2ac993be28fd28ea
-
SHA256
023587dfb8efcb39cb353a413c2773cfded347e5d8aec8086ececf395725237a
-
SHA512
208615995d1972f38718c6855084541f15ebb72d5350d827ceebf4392fe0ab0a8a3ece746508c62460b30c1b2419c32c336f0e4daff065d4aa250a502f291adb
-
SSDEEP
98304:Aor+AMF11Rtk25B9KheI8xC0sEFzwMpLte:/0/3Rl8+wMD
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4608 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4608 EXCEL.EXE 4608 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE 4608 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment Application.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4608
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.0MB
MD559f3d07bc66de65489f680c50ad5960a
SHA1af661e2447f90b9fcc26b96b494c434ea5976c06
SHA256bdde021e0202061d3e4ce0b1820a350f2f95471e66b81c86c1a9234301fea60e
SHA5124002fd18f5dead7a9c0c3e2dabbc6ae5586497eff717c1712435dec9c233be262d90b7d37cd0e81b742c4cafafa8799f46076eaa2c2c64f94e547c50db1fd987