Analysis
-
max time kernel
112s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2024, 10:27
Static task
static1
Behavioral task
behavioral1
Sample
Pepsico RFQ_P1005712.xls
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Pepsico RFQ_P1005712.xls
Resource
win10v2004-20240508-en
General
-
Target
Pepsico RFQ_P1005712.xls
-
Size
279KB
-
MD5
1ae05a24eecc15c8f0cd470683348cfb
-
SHA1
c873fb36f4b7a2a97b071fcf97140ed27b667592
-
SHA256
67d9016b859918dc754faeaee2bbe7a1f9ff00b7f9c89a6d8040f8a7ac654f43
-
SHA512
79f5793c8587425c384e33e80f5f99b508b9cfa70262e2775e8482114798ce567a36b702ee47686db3247056938f55dd7f7517eac066aae166d9bb2311facd11
-
SSDEEP
6144:STqFzL5LIT47Hvgh4vImVe8xufWVJtinfK8/cpxtL:STqFzu4L4qpBufEinSG6
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2600 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE 2600 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Pepsico RFQ_P1005712.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2600