Analysis
-
max time kernel
145s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
RFQ Data Sheet and Technical Specifications Conditioning System Package.xls
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
RFQ Data Sheet and Technical Specifications Conditioning System Package.xls
Resource
win10v2004-20240508-en
General
-
Target
RFQ Data Sheet and Technical Specifications Conditioning System Package.xls
-
Size
598KB
-
MD5
482e42e6df090161bcf785a62d4ba6bd
-
SHA1
157fa2048b286e8e117db5aa4f15ac0c681c180d
-
SHA256
19ea9e830a268fa84cd85fb37f412019e867e3a4c755c96cd48d478fa255fe23
-
SHA512
9d4c6fdd21c456ae05b510768164658c2bb723ad8be347f56c25ce570e358fa23aa172bc9a9d9a289ff0c0a1e24be632b2a6b5be80b3f88b5c9e8f75644ebdc4
-
SSDEEP
12288:XqFzu4LSAjpCh587jyQpUUHpIM7VgsHHbY0Mc/y2F:gzu4LSAFxeopRVpby
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 392 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE 392 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RFQ Data Sheet and Technical Specifications Conditioning System Package.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:392