Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
ad261c9c8dd1e4731ce59dd68afb5a093f9dbeeaf7a56280de687e7ab7024673.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad261c9c8dd1e4731ce59dd68afb5a093f9dbeeaf7a56280de687e7ab7024673.xlsx
Resource
win10v2004-20240226-en
General
-
Target
ad261c9c8dd1e4731ce59dd68afb5a093f9dbeeaf7a56280de687e7ab7024673.xlsx
-
Size
29KB
-
MD5
efa4d130859b4c07905ac28433389f52
-
SHA1
8b5865ac0943a069f78608971bd09d97dc4ccf45
-
SHA256
ad261c9c8dd1e4731ce59dd68afb5a093f9dbeeaf7a56280de687e7ab7024673
-
SHA512
fccd5dff570d20da877d4fd502dcce6634ef04589588ad95be190421d7ed61bd6a0d5cd58d0e91e6cc3f540ff119d3bf1d41b2b24ec60b57499a5aecbee76e0c
-
SSDEEP
768:wnEQpllh7tAafroiianGoHoJ+yWWn0Wht1r:nQJh7Lro4ntD+0A1r
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1908 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE 1908 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ad261c9c8dd1e4731ce59dd68afb5a093f9dbeeaf7a56280de687e7ab7024673.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1908