Analysis
-
max time kernel
185s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
17/07/2023, 05:28
Static task
static1
Behavioral task
behavioral1
Sample
Braemar MTM Report.xlsx
Resource
win10v2004-20230703-en
6 signatures
1200 seconds
General
-
Target
Braemar MTM Report.xlsx
-
Size
6KB
-
MD5
22121ca9d21e07ef70f608b196725d62
-
SHA1
2ce61d697ea0224d61da3f6868b60cc31d63d30b
-
SHA256
5946fef88400d88eb63588f948c449dcc9842cc62c37074980a8369e8c2aa812
-
SHA512
fb002b175707cf7fa9e7bfa1b2d9f277642bbd0c3d6f5a55d92d0e6fc86a27af03d6a80f943f99ba95e6e2d6e7defcdb23c64b71e7e698f5ef9de8f6e95dc2c4
-
SSDEEP
192:EyniSNEjnnReETddGKLLD4ZSBV3h3KctjQ00s:ThEjnnR/8iVlp
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1424 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 1308 7zG.exe Token: 35 1308 7zG.exe Token: SeSecurityPrivilege 1308 7zG.exe Token: SeSecurityPrivilege 1308 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1308 7zG.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE 1424 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Braemar MTM Report.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1424
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4844
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Braemar MTM Report\" -spe -an -ai#7zMap4315:118:7zEvent266241⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1308