Overview
overview
4Static
static
1Требо...3.docx
windows7-x64
4Требо...3.docx
windows10-2004-x64
1Карто...3.xlsx
windows7-x64
1Карто...3.xlsx
windows10-2004-x64
1Отчет...3.docx
windows7-x64
4Отчет...3.docx
windows10-2004-x64
1Предп...�.docx
windows7-x64
4Предп...�.docx
windows10-2004-x64
1инстр...l.docx
windows7-x64
4инстр...l.docx
windows10-2004-x64
1Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2023, 10:17
Static task
static1
Behavioral task
behavioral1
Sample
Требование РОСКОМНАДЗОР № 02-33858012 18092023.docx
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Требование РОСКОМНАДЗОР № 02-33858012 18092023.docx
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
Карточка инвентаризации 180923.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
Карточка инвентаризации 180923.xlsx
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
Отчет_1692_180923.docx
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
Отчет_1692_180923.docx
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Предписание и опросный лист РОСКОМНАДЗОР.docx
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Предписание и опросный лист РОСКОМНАДЗОР.docx
Resource
win10v2004-20230915-en
Behavioral task
behavioral9
Sample
инструкция passcontrol.docx
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
инструкция passcontrol.docx
Resource
win10v2004-20230915-en
General
-
Target
Карточка инвентаризации 180923.xlsx
-
Size
22KB
-
MD5
226b9471c1514d2a2a41eb5e52d96fd2
-
SHA1
b20fc8efe59af3f0f7b07d3109dcb718885e286f
-
SHA256
9d6f54e1b48ef4d6afcd99adcf17edf13cff73c3cf9ed5245221f7475609bb16
-
SHA512
23bd23cb8d9bc19993aeec45d5d0413cf010cd77241f60d2df302e0b0502445c01d72c1ffa7c8f89189b102f48b23148d89024d1fbee27d87e7b92b1e017e17f
-
SSDEEP
384:Sa98vCAvqHPic5JOFsEMX23mH2RrgctxVG/V9gN51aoYwIij1+bPZne6ywuW1ZD6:x98vkK0ws5X22HSg7Lgn1aeIW16Zne6k
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1500 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE 1500 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Карточка инвентаризации 180923.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1500