Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-08-2023 04:59

General

  • Target

    ˳20234²Ա/嵥б/Ա嵥.xlsx

  • Size

    12KB

  • MD5

    a5e8de2e92ed653fd5743033420e5f19

  • SHA1

    6de442e26d8ca063813093947dd95827c20f94e7

  • SHA256

    a9653d71c07ca55b556019f245eb71dd6d66ea8bb3d81a6c3c7bb926ec574715

  • SHA512

    3d06526b3f5672ac09eb7ef547dd8d18f2302e7c7b8816471cd33d94b2787801121c8d234d03a430a267e803cc72c8afac27b3f09f47ffd321eb6d8be948032e

  • SSDEEP

    192:Bs2Hv2ObsIZzavtQryWSQzjJ2BflLgSt3Y9tldo2aXs:Wqv2MsmKQ/nJ2RV/t3Y1dzaXs

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\˳20234²Ա\嵥б\Ա嵥.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:4984

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4984-0-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp
    Filesize

    64KB

  • memory/4984-1-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-4-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-3-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp
    Filesize

    64KB

  • memory/4984-5-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-2-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp
    Filesize

    64KB

  • memory/4984-6-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp
    Filesize

    64KB

  • memory/4984-7-0x00007FF8A4970000-0x00007FF8A4980000-memory.dmp
    Filesize

    64KB

  • memory/4984-9-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-8-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-10-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-11-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-12-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-13-0x00007FF8A25D0000-0x00007FF8A25E0000-memory.dmp
    Filesize

    64KB

  • memory/4984-14-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-15-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-16-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-18-0x00007FF8A25D0000-0x00007FF8A25E0000-memory.dmp
    Filesize

    64KB

  • memory/4984-19-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-17-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-20-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-21-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-22-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-24-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB

  • memory/4984-28-0x00007FF8E48F0000-0x00007FF8E4AE5000-memory.dmp
    Filesize

    2.0MB