Analysis

  • max time kernel
    122s
  • max time network
    135s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-07-2023 06:25

General

  • Target

    Scan_Doc.xll

  • Size

    2.5MB

  • MD5

    ba04aac6f4c36a1593fa81ca60722454

  • SHA1

    0ccd54e2ba3088ce59180a21eb7682f479572550

  • SHA256

    55de849673b3d780491bb00996943f1914de77692b1218e798821fe8c22ea55c

  • SHA512

    7ba50edd4530a9820da132d988f8934b096c33f2ace3e5aa0ec8595041f71aca676e354662840238d66496b3b7b01ba377444ccc3564589b6ffd32d587705be9

  • SSDEEP

    49152:G8XR54rGnugTn7g+Zp5Ybl3Qgx8Abu1sG9lmx2bcrMrvHEP31Un:G8Xr4wTnE+Z0l7i1XpwrMDktU

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Scan_Doc.xll"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1032-134-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-133-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-135-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-137-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-138-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-139-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-140-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-141-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-136-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-143-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-144-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-142-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-145-0x00007FFD9AFC0000-0x00007FFD9AFD0000-memory.dmp

    Filesize

    64KB

  • memory/1032-146-0x00007FFD9AFC0000-0x00007FFD9AFD0000-memory.dmp

    Filesize

    64KB

  • memory/1032-150-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-151-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB

  • memory/1032-168-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-169-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-170-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-171-0x00007FFD9D470000-0x00007FFD9D480000-memory.dmp

    Filesize

    64KB

  • memory/1032-172-0x00007FFDDD3F0000-0x00007FFDDD5E5000-memory.dmp

    Filesize

    2.0MB