Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 17:56
Static task
static1
Behavioral task
behavioral1
Sample
6cc22aacef9e3a53e524caea050759a2f6b696e06499ee85458cbe1b32389a47.xlsx
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6cc22aacef9e3a53e524caea050759a2f6b696e06499ee85458cbe1b32389a47.xlsx
Resource
win10v2004-20240226-en
General
-
Target
6cc22aacef9e3a53e524caea050759a2f6b696e06499ee85458cbe1b32389a47.xlsx
-
Size
60KB
-
MD5
336933c0bf6f6b19438b651dd9a7bfde
-
SHA1
242b259407ec57a3f5352a1fac40eff8f3cfbcf8
-
SHA256
6cc22aacef9e3a53e524caea050759a2f6b696e06499ee85458cbe1b32389a47
-
SHA512
aac55d53982ad9a4765421f59c4916d0862a7b7eb8a2d8d1b83a47427b33c19adf8d02c778aa09e900eefa09acbea2e26b3a073da0d0ad121939a1897e027110
-
SSDEEP
1536:cIN5DGhJDl5eZ9l0ohOplRfzDrtw86RUtdb:cI3ChJR0vl0ohYlRfzD/6o9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE 3628 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6cc22aacef9e3a53e524caea050759a2f6b696e06499ee85458cbe1b32389a47.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3628