Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 12:40
Static task
static1
Behavioral task
behavioral1
Sample
356bac11bfb7c8b7c7a83b8a90aae89db62b70a63dd92a345457973b33d5f74b.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
356bac11bfb7c8b7c7a83b8a90aae89db62b70a63dd92a345457973b33d5f74b.xls
Resource
win10v2004-20240226-en
General
-
Target
356bac11bfb7c8b7c7a83b8a90aae89db62b70a63dd92a345457973b33d5f74b.xls
-
Size
279KB
-
MD5
752051b8da3007d5bdbb5014bd3b2de0
-
SHA1
79ef8b20100c88eb89a7a0f0b843500e194a9d54
-
SHA256
356bac11bfb7c8b7c7a83b8a90aae89db62b70a63dd92a345457973b33d5f74b
-
SHA512
ed050c5a39f2f078d15b5cbc875925c7a9f52064a90446293eed8d3b958e81720a68d9f894cb7a0e1e6635ac0a652d37bd5c0c252adaef3950b60b16f39d320a
-
SSDEEP
3072:kHg5Bw6uiLs7tfEPwTHCOoNe5bPJuHm+a7M9RXXZ7IG8jk8SfBOfc6SbOBfzKsqu:cT/iOasO6LbPbRD/KFJdVATHuq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1244 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE 1244 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\356bac11bfb7c8b7c7a83b8a90aae89db62b70a63dd92a345457973b33d5f74b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1244