Analysis
-
max time kernel
315s -
max time network
1615s -
platform
windows10-1703_x64 -
resource
win10-20230703-it -
resource tags
arch:x64arch:x86image:win10-20230703-itlocale:it-itos:windows10-1703-x64systemwindows -
submitted
11-07-2023 15:27
Static task
static1
Behavioral task
behavioral1
Sample
sdfhnksdjf.png
Resource
win10-20230703-it
windows10-1703-x64
5 signatures
1800 seconds
General
-
Target
sdfhnksdjf.png
-
Size
708KB
-
MD5
7128007759f0187dce5476d8b3dd98f1
-
SHA1
9c05205af65350256e99f1b73292c921c8834f3f
-
SHA256
3a24171db90bde51e9ca9cf0e31480d641d81f6896c1cf957519896c4100357c
-
SHA512
2266f146fc5ebecc99831895f9048f5bc84db731107e84939b789c6902e92668f145e8937a7264a0799cf957b61b921d14438c12eb99b3cf383af17271e5042a
-
SSDEEP
12288:SezS++LiDPb/upHCGKFxPohOTYRUIO0xbc+sGod89k6SN8IVcmZpMvEf:Y++UbWx1KLPTTsiPaZ+8IVTZiEf
Score
3/10
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4160 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE 4160 EXCEL.EXE
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\sdfhnksdjf.png1⤵PID:5080
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4456
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\Documents\ConnectEdit.xla"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4160