Analysis
-
max time kernel
46s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 21:43
Static task
static1
Behavioral task
behavioral1
Sample
320e56a2da9a482321e1cba675a0bb771cc2bc35ac24a3f8c22f62514f3947ba.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
320e56a2da9a482321e1cba675a0bb771cc2bc35ac24a3f8c22f62514f3947ba.xlsx
Resource
win10v2004-20240802-en
General
-
Target
320e56a2da9a482321e1cba675a0bb771cc2bc35ac24a3f8c22f62514f3947ba.xlsx
-
Size
29KB
-
MD5
59ca4fae0fe8ee6e31945498d84671a1
-
SHA1
87e6eeca690e85e4b39def80ceac5ee04f77833f
-
SHA256
320e56a2da9a482321e1cba675a0bb771cc2bc35ac24a3f8c22f62514f3947ba
-
SHA512
f8f875ff89c396b845d3c0d4193ddb311316deed501e813236dc7a418be1bd08c4040729f30fae33e1c70d22b4a56a10c7b1eb652e5d46f073d68ca5608e7291
-
SSDEEP
384:3CGTYRX5Unzt2nmnAcLK5J9AVs6TeEB/g4Bmq3FrEBTqwGFzHUnoCV9RmNCtmxhV:3CGURJUnz0mD4ys2ewg4F32BUH6J948U
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3940 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE 3940 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\320e56a2da9a482321e1cba675a0bb771cc2bc35ac24a3f8c22f62514f3947ba.xlsx"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3940