Analysis
-
max time kernel
147s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 11:51
Static task
static1
Behavioral task
behavioral1
Sample
476d26810e91e137d1e3325bd66e6432ac6f9941b179cce9297bbcad2c823851.xls
Resource
win10v2004-20230703-en
General
-
Target
476d26810e91e137d1e3325bd66e6432ac6f9941b179cce9297bbcad2c823851.xls
-
Size
1.1MB
-
MD5
8240ac402de015516cc0ac72b075fe10
-
SHA1
5840469aee41db6480a5ba2dfa481a325f9bd50f
-
SHA256
476d26810e91e137d1e3325bd66e6432ac6f9941b179cce9297bbcad2c823851
-
SHA512
9f9a4e0ea26c20c830c0285b57cb310ff8c2dc2017be531729ed64a64389eef150876ffc3bbc2d13d131fa0998423cb861c71af8fee50b426df25c9aca7473fc
-
SSDEEP
24576:Az0w6sYz+o0xfsjcUos+xK5w6sAzKo0xfsjcUos+xKY3mYj3qJPR6wdB:AT6sYOxfsjdos+xKS6sAyxfsjdos+xKh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4164 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4164 EXCEL.EXE 4164 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
pid Process 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE 4164 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\476d26810e91e137d1e3325bd66e6432ac6f9941b179cce9297bbcad2c823851.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4164