Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 19:38
Static task
static1
Behavioral task
behavioral1
Sample
march-D2543-2024.xlsx
Resource
win10-20240221-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
march-D2543-2024.xlsx
Resource
win10v2004-20240226-en
4 signatures
150 seconds
General
-
Target
march-D2543-2024.xlsx
-
Size
60KB
-
MD5
acd0550549837eec668a519f61be4865
-
SHA1
0d85014f4d9365b992485db839c7b26a9bb9591d
-
SHA256
1680c3675a1c76e6308e8cd7c1b3545bd98f381f72d32b9e7f579aa5dfeb19be
-
SHA512
c5813ee62b48358aeaea4a06b0ed09a4843096c0c9aa6e9329434880fcf693efde0234830aef60ee9c7972c6be24f9423fd5d4eb44608a48e4b818fc873357df
-
SSDEEP
1536:64N5DGhJDl5eZ9l0ohOplRfzDrtw86RUtds:643ChJR0vl0ohYlRfzD/6o2
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 468 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE 468 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\march-D2543-2024.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:468