Analysis
-
max time kernel
100s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05-06-2024 12:47
Static task
static1
Behavioral task
behavioral1
Sample
=?UTF-8?B?U3BlY2lmaWNhyJtpaSBuZWNlc2FyZS54bHM=?=.xls
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
formularul de furnizor.xls
Resource
win10v2004-20240508-en
General
-
Target
formularul de furnizor.xls
-
Size
280KB
-
MD5
fa3a4609a398b798a66634bb2e0ad22a
-
SHA1
ae7b835d7275b0ae8858b84fca2611665ee328ec
-
SHA256
b3f8511ac449f0546edf04eff5ff5b139618dfb6e0d986a9bfad135cab2a5811
-
SHA512
c5c93173c395f85738c88b843185531abba1ab9385a6157ddc28c63f20140257f108529bde6640622a2af9750d93958f2e6248cf2c7948bc120db456dda24965
-
SSDEEP
6144:AqFzL5LIT47HSL+xjfvu1DHgZXuUZjJyHZeroxnn:AqFzu4LSL+xbl7jk5vd
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3656 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\formularul de furnizor.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3656