Analysis
-
max time kernel
234s -
max time network
270s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2023, 13:30
Static task
static1
Behavioral task
behavioral1
Sample
324d602472848d0e0306d1b95f0ef6e85fb7f6f9f02892105d70733a9d544b61.xlsx
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
324d602472848d0e0306d1b95f0ef6e85fb7f6f9f02892105d70733a9d544b61.xlsx
Resource
win10v2004-20230703-en
General
-
Target
324d602472848d0e0306d1b95f0ef6e85fb7f6f9f02892105d70733a9d544b61.xlsx
-
Size
62KB
-
MD5
5c577cb55f6c1fd22ff7df65cb109d52
-
SHA1
7b2fde7345da16b97cd08838887536517f6e0388
-
SHA256
324d602472848d0e0306d1b95f0ef6e85fb7f6f9f02892105d70733a9d544b61
-
SHA512
e57ed2da9f91c5e651d7971b4a55aa1a43b9e917d1ca9f5439381aa98b58227a56bba6a72548fbac8b4608902b2069c5b8b3c0a5f81507660589d190d6a61617
-
SSDEEP
1536:p2HKc9GkW95jEMszdgIZuou6MV8ZV4pBhTKr86qa:cHKc0nYpZgIZLjOaV4pBSpqa
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3752 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3752 EXCEL.EXE 3752 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE 3752 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\324d602472848d0e0306d1b95f0ef6e85fb7f6f9f02892105d70733a9d544b61.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3752