Analysis
-
max time kernel
112s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 15:14
Static task
static1
Behavioral task
behavioral1
Sample
swift copy.xls
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
swift copy.xls
Resource
win10v2004-20231130-en
General
-
Target
swift copy.xls
-
Size
1.1MB
-
MD5
66ca72c4462eaa25b60e6b763232a869
-
SHA1
5d867073ff9b46de8b7f205cad708c656fa35d05
-
SHA256
220fe5d95262f3b41e254a52b03b54e809ca4ef2ac80c7fb2048513ce34721dc
-
SHA512
2b3fffc7e555583d1d7d4f2e9eed8d54422cd555c1b5009abfd34bee429772871c9df9d44e948292af08d5e62d11dee4aab8afdf6ec7d5c272ec126265092ecc
-
SSDEEP
24576:lw6/6ZyXAXZS0IAXZSpkw6/GZyBcUfEx3jj6VDNanGdvKw2M8:W6/kBEsE56/QiffavMDNXCx1
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1084 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE 1084 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\swift copy.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1084
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
526KB
MD559b9d0ea751ef18bd4ad542cd66e74ad
SHA18fc35ab264c02d797aa89c47a7a3bde70c01abe7
SHA25656e18ed63d7f556fb497445110b4b2185eb7eb6d6040890e287c62f957992d27
SHA51247782e8f09e38704629df8ab4ebdd355be5817e4af1f41a705bd9ebad5dcc66d09c3084bed6ada9b519ddae99132d0d1a52af56f44ffae5f30433d8a9c36e44a
-
Filesize
1.4MB
MD51fcb3f34b5588f6a647a06dff1811bf9
SHA11f5ef0e6e41c14795decedcefc883ab9000fac9a
SHA256a99e8172248dac0b2a6243d06a862901989857b0c2ecbed5f25ddb0d1a95154e
SHA51247e951583afff444f9adb09beab0d83f9792b46d3e1fabf05d21068218d64b3cba48e2dc22fe0a7bd3252a0e0c8866faa244b5dc3784bd336ecbc9f2924fb2aa