Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19-07-2023 07:35
Static task
static1
Behavioral task
behavioral1
Sample
9695b2a0fb80c9edcbac4402756b38a4b1f7d0157a2ea201be08392701957d6b.xls
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
9695b2a0fb80c9edcbac4402756b38a4b1f7d0157a2ea201be08392701957d6b.xls
Resource
win10v2004-20230703-en
General
-
Target
9695b2a0fb80c9edcbac4402756b38a4b1f7d0157a2ea201be08392701957d6b.xls
-
Size
25KB
-
MD5
90895b2e14da0e4f9e27aee67a4ab24e
-
SHA1
786654ce97ddd02fc9ed6081d4f8b60449ac491d
-
SHA256
9695b2a0fb80c9edcbac4402756b38a4b1f7d0157a2ea201be08392701957d6b
-
SHA512
7b2afe6d0a7748a827011087db8e4ff443937c28ddc89919bf9136cad7f786e3de5de348aeb36353dc888398606ff33fa515b864e3145e7ac325c0dfd4cccb94
-
SSDEEP
768:2eeeqePweJQzcQvPbtV8S8k1seAvT2PnNxEtjPOtioVjDGUU1qfDlaGGx+cL2Qn5:2eeeqePweJQzcQvPbtV8S8k1seZNxEtz
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2072 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2072 EXCEL.EXE 2072 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE 2072 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9695b2a0fb80c9edcbac4402756b38a4b1f7d0157a2ea201be08392701957d6b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2072