Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28/12/2023, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
f88144e9251d5d8e9bf0a082723fa155.xls
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f88144e9251d5d8e9bf0a082723fa155.xls
Resource
win10v2004-20231215-en
General
-
Target
f88144e9251d5d8e9bf0a082723fa155.xls
-
Size
18KB
-
MD5
f88144e9251d5d8e9bf0a082723fa155
-
SHA1
fe0d59e118c8a035e0c19ce306368cae35250616
-
SHA256
cf31bdc126c3f710c4dd5e69046a98766c0e3f9618d4f35c6961788128328f80
-
SHA512
62f74cb90da11dc0f82deae8d5e87d95966f222499cccf724e15d6c0d6db02ca6c80797dbc6252aa28c12d3089d73d223922167ffa4b0296efb2ad4ea939843a
-
SSDEEP
192:nKDPPPJIm8tfuk/usA0M6/lc5/XHqP2rRFA6aBlPo0q2B0TcGaE:lZukGsAydc5v5vAlBpo0qjw
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 540 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 17 IoCs
pid Process 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE 540 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f88144e9251d5d8e9bf0a082723fa155.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:540