Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 19:16
Static task
static1
Behavioral task
behavioral1
Sample
df8ab6e392d1cd372d5af3d61656e7caf13549a6d5cd16360acb62db566f6ef4.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
df8ab6e392d1cd372d5af3d61656e7caf13549a6d5cd16360acb62db566f6ef4.xlsx
Resource
win10v2004-20240221-en
General
-
Target
df8ab6e392d1cd372d5af3d61656e7caf13549a6d5cd16360acb62db566f6ef4.xlsx
-
Size
272KB
-
MD5
9a5d5c68c6b0094d8f52cc37919a91b9
-
SHA1
0fc1c112dfcd8d6e5228551d9e25c755185231d5
-
SHA256
df8ab6e392d1cd372d5af3d61656e7caf13549a6d5cd16360acb62db566f6ef4
-
SHA512
d9611579aade0f09489510c9e60c9678e7b12c8f1daae1aeec257c87afdbe8ebef7af940861283ddf94f6a7d3eb00d37e0a7f2bd2e2553156495ce31c2de7e2c
-
SSDEEP
6144:UaTMddjlohIonAAAAAAAg/AXGh6AAAAAAAX9n3mFuz57:PIoLb7
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2412 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2412 EXCEL.EXE 2412 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE 2412 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\df8ab6e392d1cd372d5af3d61656e7caf13549a6d5cd16360acb62db566f6ef4.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2412