Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
13/10/2023, 22:30
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Heur.19870.xlsx
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.Heur.19870.xlsx
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.Heur.19870.xlsx
-
Size
665KB
-
MD5
7027d5d05a149f369679f78a0221f7ae
-
SHA1
5ab293c15fe3df10ccf539086d36d6ab6e129e7e
-
SHA256
678bd3ebd373023271d962c53d7e4bcc0060c33c5429cfcac39d1d67d363abd8
-
SHA512
d950445e8e8edb8a2bb30961b1b4721382d21c2e10a7872dcd43aec9bb76fe4e2718de3f32db8d2f9c9d5dc38ed235a67fa82049fed8db01a6dc327aa8b6e1d2
-
SSDEEP
12288:pKfFPqUmoEP8fR+xqjXPfSVu7218XKcIS7FRXTcW7X3PJheGSMkrYQVOYYxGvTb:ph0p+xoXSIyqKcIS7FRXwWTJlSMkrYQH
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3892 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3892 EXCEL.EXE 3892 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE 3892 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Heur.19870.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3892