Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
06/06/2024, 17:44
Static task
static1
Behavioral task
behavioral1
Sample
allitems.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
allitems.zip
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
allitems.csv
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
allitems.csv
Resource
win10v2004-20240508-en
General
-
Target
allitems.csv
-
Size
164.9MB
-
MD5
53d6999247b01bc0073d88e35324671f
-
SHA1
c2cd87c5e952943fc6b27ecf1ad76acc6d4782d1
-
SHA256
b937a6b26aca7abdf4bc432b78caf0c9db18cca9970878bed517bbc8fe618a9a
-
SHA512
232c522382586d804e6151f90b3c622775532d2a7a6e69da757dfbf54bdbe6c4e89fd0b69e0486ba8ea4ad9f3b6d32defb0c31b965b3d52a54de3a5ff4da4dff
-
SSDEEP
98304:Ooe33wnpTf3iOpeB6z7HtqvgA1aL7ZBTfFX6:O53wn53zpeB6PtqvgA1aL7ZBTfFX6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1624 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1624 EXCEL.EXE 1624 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE 1624 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\allitems.csv"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1624