Analysis
-
max time kernel
34s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 02:04
Behavioral task
behavioral1
Sample
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls
Resource
win10v2004-20240508-en
General
-
Target
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls
-
Size
177KB
-
MD5
aacff78415df8fa847231f99a5698a63
-
SHA1
d2b43ad822acbfe76c253dddc3fed139caadca09
-
SHA256
a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554
-
SHA512
fd951dc11ad6787c19d940bb81113621242c1920203c3a9322a08dd1e1f3d36116a8a325f04945e27c1beea71a253f9bc0be4ba67cf96b59267c60edeeff0db1
-
SSDEEP
3072:pL8Z14oIxEtjPOtioVjDGUU1qfDlaGGx+cL+LIfdAksW6M8LG/LhUUeTsd/k8STR:pLm14dxEtjPOtioVjDGUU1qfDlavx+W0
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2328 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2328 EXCEL.EXE 2328 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE 2328 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a03e3c42a8ad3dc7110dcc16cde29e7a94409c543c86d128b0f4830053d45554.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2328