Analysis
-
max time kernel
101s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
29-05-2024 13:33
Static task
static1
Behavioral task
behavioral1
Sample
3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f.xls
Resource
win10v2004-20240426-en
General
-
Target
3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f.xls
-
Size
307KB
-
MD5
c3dc8fb22795f4efb58e63c8f2110561
-
SHA1
97e7c1949993ce9246baf1bb5c9d4f34020435f4
-
SHA256
3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f
-
SHA512
7f5633732e074b9439bacbf0c9704e80c9bd5e4df97e734cc0026841ed54a630fb4e319869180fa1ee37031995aa45bc97842d81fe7ea21f4e0753320fc4193b
-
SSDEEP
6144:q0W8ZkNBZGbxdEKPdQEUD5rvPGW+Z0a42hULbREiMg:FW8qNnSdEkO9rvPB8jKZ
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2272 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE 2272 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3df16653affd5ddd6a27c4b9a4e92aa3e4b87fc61b4332b7c9675ba1cfc8a70f.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2272