Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
01-11-2023 10:14
Static task
static1
Behavioral task
behavioral1
Sample
SOA_1.xls
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
SOA_1.xls
Resource
win10v2004-20231020-en
General
-
Target
SOA_1.xls
-
Size
1.2MB
-
MD5
18d136d65a9ba1d8819f9dd525b507b7
-
SHA1
095315780b4608aa3c2c998431be510a65bc8df7
-
SHA256
f965fd659332137f24a3d7d759470200d973e9f1e17bcbe4b54ac1a84904fab9
-
SHA512
b2580c22dbee84af55ec179b225d3c5f9e8a40010294e4fb5fcb4b6d28e58e22476ab002a9130f99642cd744b80cd0a67d7a110919528ec509d18f10cc965b82
-
SSDEEP
24576:0uBSw6/uZyD3bV0w6/WZy43bVtEo84TA5YLp0JHOm9kyv0fLhedKwmx:v6/4K3bVH6/AP3bV7jTp9OHOmP8f97V
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4544 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE 4544 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SOA_1.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD51fcb3f34b5588f6a647a06dff1811bf9
SHA11f5ef0e6e41c14795decedcefc883ab9000fac9a
SHA256a99e8172248dac0b2a6243d06a862901989857b0c2ecbed5f25ddb0d1a95154e
SHA51247e951583afff444f9adb09beab0d83f9792b46d3e1fabf05d21068218d64b3cba48e2dc22fe0a7bd3252a0e0c8866faa244b5dc3784bd336ecbc9f2924fb2aa