Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
JPM_EU Oils_4Q23 Preview.xlsx
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
JPM_EU Oils_4Q23 Preview.xlsx
Resource
win10v2004-20231222-en
4 signatures
150 seconds
General
-
Target
JPM_EU Oils_4Q23 Preview.xlsx
-
Size
352KB
-
MD5
8e8d597f6b496e747e32694bfd7ef409
-
SHA1
04cbc428ef0cc2a74ef03f06ae9da11d5f17eb21
-
SHA256
ae2e7cc6644fbc8e27d85b4e48b92333644c73acd07bc171e68b336004da1d7a
-
SHA512
0415380504136b46f426388a541f513af185d0f9489c1457add932cea9bd418ef710154e1f652d77a2cda943ef0ed872fee53d57665bf0a4ad013894ca11bb04
-
SSDEEP
6144:btcxzsSx1MEBy83AVjY/YnfjIXBe0XzTWliEPV98pVlTLW:uxoSxyEBtQFY/YfkXBeImYEPV985m
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2888 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE 2888 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\JPM_EU Oils_4Q23 Preview.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2888