Analysis
-
max time kernel
122s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
21-07-2023 06:25
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
Scan_Doc.xll
Resource
win7-20230712-en
windows7-x64
13 signatures
150 seconds
Behavioral task
behavioral2
Sample
Scan_Doc.xll
Resource
win10v2004-20230703-en
windows10-2004-x64
4 signatures
150 seconds
General
-
Target
Scan_Doc.xll
-
Size
2.5MB
-
MD5
ba04aac6f4c36a1593fa81ca60722454
-
SHA1
0ccd54e2ba3088ce59180a21eb7682f479572550
-
SHA256
55de849673b3d780491bb00996943f1914de77692b1218e798821fe8c22ea55c
-
SHA512
7ba50edd4530a9820da132d988f8934b096c33f2ace3e5aa0ec8595041f71aca676e354662840238d66496b3b7b01ba377444ccc3564589b6ffd32d587705be9
-
SSDEEP
49152:G8XR54rGnugTn7g+Zp5Ybl3Qgx8Abu1sG9lmx2bcrMrvHEP31Un:G8Xr4wTnE+Z0l7i1XpwrMDktU
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1032 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE 1032 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Scan_Doc.xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1032