Analysis
-
max time kernel
78s -
max time network
79s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
12/08/2024, 11:37 UTC
Static task
static1
Behavioral task
behavioral1
Sample
statapril2024-7660.xlsx
Resource
win10-20240404-en
4 signatures
150 seconds
General
-
Target
statapril2024-7660.xlsx
-
Size
56KB
-
MD5
ea31e71d72077ff13d6e8a1078e9d8dc
-
SHA1
eedbcfaaef25079d16483da44fc579bf3733733f
-
SHA256
5a7c4b8d40cd4d7c06f11d4226edd65b734f4a24a1158c5926add4993863f09e
-
SHA512
e27fb2b995ecdd9039759f6812653106d3ca2be19ee192fdba95083f36f2ea2f9d82ac5338c18fa564d4340fe18482e1aef06b6ca3197f51d08447e62de17fa9
-
SSDEEP
768:ZFnM1dDlT2qpaOKFSGOJdGvoZCPAUJ1YxBardD2TSWGdCIKD15ogXnlq5gR:/mZ2u4OPKIxoEuDKJnlnR
Score
1/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4660 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\statapril2024-7660.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:4660
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservice -s fdPHost1⤵PID:168
Network
-
Remote address:8.8.8.8:53Requestroaming.officeapps.live.comIN AResponseroaming.officeapps.live.comIN CNAMEprod.roaming1.live.com.akadns.netprod.roaming1.live.com.akadns.netIN CNAMEeur.roaming1.live.com.akadns.neteur.roaming1.live.com.akadns.netIN CNAMEfrc-azsc-000.roaming.officeapps.live.comfrc-azsc-000.roaming.officeapps.live.comIN CNAMEosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comosiprod-frc-buff-azsc-000.francecentral.cloudapp.azure.comIN A52.109.68.129
-
Remote address:52.109.68.129:443RequestPOST /rs/RoamingSoapService.svc HTTP/1.1
Cache-Control: no-cache
Connection: Keep-Alive
Pragma: no-cache
Content-Type: text/xml; charset=utf-8
User-Agent: MS-WebServices/1.0
SOAPAction: "http://tempuri.org/IRoamingSettingsService/GetConfig"
Content-Length: 511
Host: roaming.officeapps.live.com
ResponseHTTP/1.1 200 OK
Content-Type: text/xml; charset=utf-8
Server: Microsoft-IIS/10.0
X-OfficeFE: RoamingFE_IN_49
X-OfficeVersion: 16.0.18004.30575
X-OfficeCluster: frc-000.roaming.officeapps.live.com
X-CorrelationId: 8894cc8c-d361-4d73-afeb-d29c88a272b7
X-Powered-By: ASP.NET
Date: Mon, 12 Aug 2024 11:37:47 GMT
Content-Length: 654
-
Remote address:8.8.8.8:53Request46.28.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request129.68.109.52.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.214.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request73.159.190.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request15.173.189.20.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Requestc.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request172.210.232.199.in-addr.arpaIN PTRResponse
-
Remote address:8.8.8.8:53Request19.229.111.52.in-addr.arpaIN PTRResponse
-
1.7kB 7.7kB 11 10
HTTP Request
POST https://roaming.officeapps.live.com/rs/RoamingSoapService.svcHTTP Response
200 -
156 B 3
-
156 B 3
-
156 B 3
-
156 B 3
-
73 B 250 B 1 1
DNS Request
roaming.officeapps.live.com
DNS Response
52.109.68.129
-
71 B 145 B 1 1
DNS Request
46.28.109.52.in-addr.arpa
-
72 B 146 B 1 1
DNS Request
129.68.109.52.in-addr.arpa
-
74 B 128 B 1 1
DNS Request
172.214.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
73.159.190.20.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
15.173.189.20.in-addr.arpa
-
2.6kB 4
-
-
118 B 182 B 1 1
DNS Request
c.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.f.f.ip6.arpa
-
74 B 128 B 1 1
DNS Request
172.210.232.199.in-addr.arpa
-
72 B 158 B 1 1
DNS Request
19.229.111.52.in-addr.arpa