Overview
overview
4Static
static
1Malware_Po...I.xlsx
windows7-x64
1Malware_Po...I.xlsx
windows10-2004-x64
1Malware_Po...s.docx
windows7-x64
4Malware_Po...s.docx
windows10-2004-x64
1Malware_Po...ar.bat
windows7-x64
1Malware_Po...ar.bat
windows10-2004-x64
1Malware_Po...reo.py
windows7-x64
Malware_Po...reo.py
windows10-2004-x64
Malware_Po...oso.py
windows7-x64
Malware_Po...oso.py
windows10-2004-x64
Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2023 01:06
Static task
static1
Behavioral task
behavioral1
Sample
Malware_Polimorfico/archivos encriptados/1103790 PARCIAL II.xlsx
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
Malware_Polimorfico/archivos encriptados/1103790 PARCIAL II.xlsx
Resource
win10v2004-20230703-en
Behavioral task
behavioral3
Sample
Malware_Polimorfico/archivos encriptados/Plantilla para apuntes.docx
Resource
win7-20230712-en
Behavioral task
behavioral4
Sample
Malware_Polimorfico/archivos encriptados/Plantilla para apuntes.docx
Resource
win10v2004-20230703-en
Behavioral task
behavioral5
Sample
Malware_Polimorfico/ejecutar.bat
Resource
win7-20230712-en
Behavioral task
behavioral6
Sample
Malware_Polimorfico/ejecutar.bat
Resource
win10v2004-20230703-en
Behavioral task
behavioral7
Sample
Malware_Polimorfico/enviarCorreo.py
Resource
win7-20230712-en
Behavioral task
behavioral8
Sample
Malware_Polimorfico/enviarCorreo.py
Resource
win10v2004-20230703-en
Behavioral task
behavioral9
Sample
Malware_Polimorfico/malicioso.py
Resource
win7-20230712-en
Behavioral task
behavioral10
Sample
Malware_Polimorfico/malicioso.py
Resource
win10v2004-20230703-en
General
-
Target
Malware_Polimorfico/archivos encriptados/1103790 PARCIAL II.xlsx
-
Size
50KB
-
MD5
e1a5e4de350a73dc80e2a87124c325b6
-
SHA1
5119a0ee9ab484353f1f10e4d64feedb52ed36c9
-
SHA256
3ffcd3e2fe18fa133ee1c26ed18e7291b6a969485a0d9f574d18be227dbfc5ef
-
SHA512
33363fe8b85ad035b0c8a559010a9ee13fa112c4c80ea4a0ca17c5fddde5f279604c0ab0e7b955dd1ae5ffa803fe472abeab388d2c707e0c1df1fb72cb0312ba
-
SSDEEP
768:0su2d2YnAh2AhPyfWx2f//ssr4Z9LPVLEl0bIdIgsHyF379kRZOFWhLm:5u2dZS2mK+x2f//rE9zSXmHyFr9kRtK
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4080 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4080 EXCEL.EXE 4080 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE 4080 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Malware_Polimorfico\archivos encriptados\1103790 PARCIAL II.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:4080