Analysis
-
max time kernel
1198s -
max time network
1204s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
20-03-2024 12:54
Static task
static1
Behavioral task
behavioral1
Sample
ESAREA-ngoowrejjdebusx-1710889917.xlsx
Resource
win10-20240221-en
Behavioral task
behavioral2
Sample
ESAREA-ngoowrejjdebusx-1710889917.xlsx
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
ESAREA-ngoowrejjdebusx-1710889917.xlsx
Resource
win11-20240221-en
General
-
Target
ESAREA-ngoowrejjdebusx-1710889917.xlsx
-
Size
56KB
-
MD5
e561b5787c53f30780f0253e72fc87ea
-
SHA1
25c17311027b20774c96e16fd0557c1899ca8c1a
-
SHA256
60332509742968a19b12375d995fa5f9c695962c08f7df4fe0dc1ef83fbdcfea
-
SHA512
484cd13d83295a1d4c203e41cf6c2bd577683fef6872b7c317de7cdef096023bf39267474803189495cb22c7b824113101e1c4ad26d9ec79e5cc8776b1737357
-
SSDEEP
1536:Fkws9oLE3Ow6DyPgMUti9xx7bxNfI5ydaRLgIui3pqDyBROnlTo:FSoEOfEgMNdxI5yYhgu5zBRY0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5008 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 5008 EXCEL.EXE 5008 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE 5008 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\ESAREA-ngoowrejjdebusx-1710889917.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:5008