Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
Exported Data (3).csv
Resource
win7-20231020-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
Exported Data (3).csv
Resource
win10v2004-20231020-en
4 signatures
150 seconds
General
-
Target
Exported Data (3).csv
-
Size
85B
-
MD5
a2dce0b720e92730943005064639f05a
-
SHA1
917e4690c2e42df27ffce0ddf4771264fd4b473c
-
SHA256
482072002c4fe5b7da9bc01724c213f84273f6851af2162ef45dcc022fb9e369
-
SHA512
edcbfd5791758de5516927d4926c916038684c6dce29489926a261061c4f6d3bb2fba2a157ffdcd348c67abe45896652cbe368bb651217de4179027fd2fd9dd1
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4156 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Exported Data (3).csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4156