Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12-10-2023 13:27
Static task
static1
Behavioral task
behavioral1
Sample
Inf_Turno 20230915_A.xlsm
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
Inf_Turno 20230915_A.xlsm
Resource
win10v2004-20230915-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
Inf_Turno 20230915_A.xlsm
-
Size
130KB
-
MD5
7e34cb0463a8d8d459aaac3af1bb363c
-
SHA1
099a51640d398c81087d2ecfdbe2db087a6830df
-
SHA256
876dac25b9c99526fd2d80155fecced1de94b16007dc15864d0ecca950080b3d
-
SHA512
b80424e8d5bc3797402d6bc2969790e9c1210f1ac4c8ce1c302b70e3bc030baae04d66b7d403acf399b015e471a61890993c84679e4756f567246331b72e0494
-
SSDEEP
1536:rhD1UaijXzo6zQJZ3s99BD7cgvGthWaq99b2P5nlE5m5+QuIovMrY5h94MgX/GYB:9/i3oWu89HD7cgkWDb25lZUM0R5h9IV
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3904 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3904 EXCEL.EXE 3904 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE 3904 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Inf_Turno 20230915_A.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3904