Analysis
-
max time kernel
112s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
24/06/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
PO-2405280.xls
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PO-2405280.xls
Resource
win10v2004-20240508-en
General
-
Target
PO-2405280.xls
-
Size
281KB
-
MD5
dceda18926b25ae0f1abc5369aff1cd1
-
SHA1
28ccc153f5d3c35ad1ca7f158a5bfe37b000ff92
-
SHA256
5bbc37ffe3d61033704ab73ad96dd62b616a236f21821c616693c16353096bbf
-
SHA512
e840ce89a6302c5590d64919f6533cd4aafaf7c0b356ab510241bfd8154c7fbac21ea0e197a528fc47f86ca550087dac04293a94f3d761f0f25bf87fefc5c5a5
-
SSDEEP
6144:jn3dwSGCfI92PhspZJ3Hu7OivXWoNINb52y6TjB+8/ElNQT:j3uS9gkPhCzQOBb52y6TTQN
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 560 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE 560 EXCEL.EXE -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PO-2405280.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:560