Analysis
-
max time kernel
56s -
max time network
59s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-07-2024 21:02
Behavioral task
behavioral1
Sample
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls
Resource
win10v2004-20240508-en
General
-
Target
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls
-
Size
73KB
-
MD5
fb18041ce63792de83fab651e83f4ac6
-
SHA1
4637967212651a20033bd6225879e9e430c8aec2
-
SHA256
729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9
-
SHA512
574663005951a836388c7af25f496a78e5f6adc3677fe4deeafd54736e18531f44ae80e739e1bfd62b95d8c4d0bffb661c9eac094704d85dfad8176b729365eb
-
SSDEEP
384:TcDV9ZTGheA+riggyZsIXCfUTC4sDvC6jsBBCMfcKSCHkMmbVogsL1nq4UuhZa+W:wD5HrigFN5I0K+4sL7h7Yaza86
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 944 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE 944 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\729c2c41e2160ea0f9c3ffd5918db0e046aa9c978844500b8c9c52b0265b9ac9.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:944