Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
18/07/2023, 12:03
Static task
static1
Behavioral task
behavioral1
Sample
a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c.xlsx
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c.xlsx
Resource
win10v2004-20230703-en
General
-
Target
a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c.xlsx
-
Size
169KB
-
MD5
ec6335ee7b2616c999d18d95480dfc1c
-
SHA1
4a9e314ff2316199d913cb1801ee0b4acb110acd
-
SHA256
a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c
-
SHA512
351ae053435b8215dc70ed6285f9d15dae5b9395ae01a316fa9d7b0aa0b3a8c68317bb694376d0a3e324a81d2cbd8fe8b85010acc62d8af57cbccaee3319e059
-
SSDEEP
3072:IpTnYqXVeoqeeS/A1u3VUpYW8ELuSfO0VwcPNsktryu19ny6c/CGSG:uTnJFeleex03YYW8quS7XNZtryu3ny66
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4208 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4208 EXCEL.EXE 4208 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE 4208 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4208 wrote to memory of 2088 4208 EXCEL.EXE 88 PID 4208 wrote to memory of 2088 4208 EXCEL.EXE 88
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a40d6d685730134b481b53d7b84d0e53cd8c752b896c003ba578ed2736c0e47c.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2088
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2824