Analysis
-
max time kernel
101s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix (2).xll
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix (2).xll
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Quarterly Cambodia Poll Appendix.pdf.lnk
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Quarterly Cambodia Poll Appendix.pdf.lnk
Resource
win10v2004-20240802-en
General
-
Target
Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll
-
Size
660KB
-
MD5
ea64d820b7ee387d0e811bca0104d9e4
-
SHA1
6f48f58d80ae41f6b979402696c70db74afc3135
-
SHA256
af74d416b65217d0b15163e7b3fd5d0702d65f88b260c269c128739e7e7a4c4d
-
SHA512
b096717383ec11253d918efcdbe729752869b5e6502875affb1ceb98b8c7097c69103cb57993b42068c38c58781f5476453e5753b9f6e05403d41bc6b3bdf780
-
SSDEEP
6144:yxOJXk57IMp7oyR4y6Qf3lbp83A6zbKsS5ukTP2YmqtbSGUmuqZGw+gSe81H9zq2:yx2s7IMrR4yVld8bzbBSreDqZGDxlq
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3756 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE 3756 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Key Data 2023 Quarterly Cambodia Poll Appendix(1).xll"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3756