Analysis
-
max time kernel
146s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:29
Behavioral task
behavioral1
Sample
56996_1694483296_83724.xls
Resource
win7-20230831-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
56996_1694483296_83724.xls
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
56996_1694483296_83724.xls
-
Size
135KB
-
MD5
08dee7d9b7887a0d534dbe0aef15d9fe
-
SHA1
ec1e25bf3fde459a8e7fb14cc5771d0b7085c36c
-
SHA256
42662ebf2a0b4ec29b496675159769b20c160d0d58814142931bc18bd472f8e6
-
SHA512
307ef55967f1918a5232e70c56f47066bc85bb9a6b7c16025a764df2ddd68d615cc1ef29c573c4fa1103f456f122f537a39471da0afbf0eb8901d7f242589a44
-
SSDEEP
3072:nVUpjDqF+wRj/eA05iis3xqMKvmuSb80+xqrP09qVizST9iJPRH+Nip:nVUpjDqF+wRj/eA05iis3xqMKvmuSb8x
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4884 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4884 EXCEL.EXE 4884 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE 4884 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4884 wrote to memory of 1964 4884 EXCEL.EXE 93 PID 4884 wrote to memory of 1964 4884 EXCEL.EXE 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\56996_1694483296_83724.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1964
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3036
-
C:\Windows\system32\werfault.exewerfault.exe /h /shared Global\3280af47dcbb498e84292210c14b96ea /t 2376 /p 48841⤵PID:5000