Analysis
-
max time kernel
151s -
max time network
279s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 08:55
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
NovoNordiskPurchaseOrder.xll
Resource
win7-20240704-en
windows7-x64
5 signatures
300 seconds
Behavioral task
behavioral2
Sample
NovoNordiskPurchaseOrder.xll
Resource
win10v2004-20240802-en
windows10-2004-x64
5 signatures
300 seconds
General
-
Target
NovoNordiskPurchaseOrder.xll
-
Size
17KB
-
MD5
099ec9d4290253ab7de142d541185bcf
-
SHA1
c5453c57f22105fe28cdf3241c263b69644fc3e7
-
SHA256
c867a84298f16a3ee66b52ca6f6d28cad18bb12446b6cc68440e7ac50199ec14
-
SHA512
d65b21e7608113006acedfa2cf7d17abc5bcd14e07a8c04d67a6103fd7fb690b7bbbe5c93621ddd1bb47d6ab9ba285e362aca1926649be4d5ce3ac25b353b5a1
-
SSDEEP
192:i7hoPUWCW69EyKkgt1dIJ6G1EfeUIyzizkUNSPJfS2lX52E3fpAL:i7Vr0yngvHFfeDzk1PT1A
Score
7/10
Malware Config
Signatures
-
Loads dropped DLL 2 IoCs
pid Process 1188 EXCEL.EXE 1188 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1188 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE 1188 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\NovoNordiskPurchaseOrder.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1188