Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2023, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
db6d4c188888441511d012e793cfbe9df8ae17eb.xls
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
db6d4c188888441511d012e793cfbe9df8ae17eb.xls
Resource
win10v2004-20230915-en
General
-
Target
db6d4c188888441511d012e793cfbe9df8ae17eb.xls
-
Size
80KB
-
MD5
6a2c1c1a82378a685dae9f8a1d7a29e1
-
SHA1
db6d4c188888441511d012e793cfbe9df8ae17eb
-
SHA256
0c2dc9c384e251b4fd4e18c8f779ca837fb327fcf1337d10d2f2cd44480c322c
-
SHA512
113866d705919ffb9a85347d8683cde88582d2b6e444d213435bd7e311e00f25cc32c944c792e50a86229be07c30b20976f24738c8a12d45851d216ff0604dad
-
SSDEEP
1536:gp8ihwl2rqX1JD9V21KcUuwRV5p5iKBjEPh:gp16ZDD21KcUuwRV5p5icjYh
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1908 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1908 EXCEL.EXE 1908 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\db6d4c188888441511d012e793cfbe9df8ae17eb.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1908