Analysis
-
max time kernel
135s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 13:31
Static task
static1
Behavioral task
behavioral1
Sample
AzorultDownloaderCVE-2017-11882.xlsx
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AzorultDownloaderCVE-2017-11882.xlsx
Resource
win10v2004-20231222-en
General
-
Target
AzorultDownloaderCVE-2017-11882.xlsx
-
Size
6KB
-
MD5
59d6a0e5df6609df36f4ef5b045b8ef5
-
SHA1
e10c54b688611bf136d851e939fdbd1aa59db2bf
-
SHA256
9bc4b952bd032af31bc5bb599cee4be1fcbdf6aacc019d52cdc44d866a5ae68d
-
SHA512
c7091c8bf49cab899c937cec2345118de93b87dac23ede443e3b6a44c857f97eeaab5a33aabf928603af4d83757237482c2a02abc2650cf3d6605d5e061fd060
-
SSDEEP
96:YBcBk706aBdd+XPJfjF0vGkP31RlEoQXBKQmmXQrFo5+WPnUSEvCHvfLSUs85d4o:TqZ5U1qXdXJ5+WP9iCPTLB50a
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2592 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE 2592 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\AzorultDownloaderCVE-2017-11882.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2592