Analysis
-
max time kernel
1199s -
max time network
1146s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
02-10-2024 01:15
Behavioral task
behavioral1
Sample
Website_Redesign_Project.xls
Resource
win10v2004-20240802-en
windows10-2004-x64
6 signatures
1200 seconds
Behavioral task
behavioral2
Sample
Website_Redesign_Project.xls
Resource
win11-20240802-en
windows11-21h2-x64
6 signatures
1200 seconds
General
-
Target
Website_Redesign_Project.xls
-
Size
92KB
-
MD5
8da737e5f973809a7ae6ddc039777635
-
SHA1
5d11137d7ee9cd56f2b97732fb95f1c60290ddf6
-
SHA256
ae077a49b9c64042bfec4c08c90696191ebf0cde63b8a2fb8a470ebe73427ced
-
SHA512
e089b0e9cf4e05536713f22b33b54c2e92e73fd5bf6bfc87623b394bf1584170ab3065aaa3b0b31d826e0ab783d0ad110c8f7fb1223331a345c785c0d79bc457
-
SSDEEP
1536:QcKoSsxz1PDZL2Qiw+4868O8K/5Le1k3hOdsylKlgxopeiBNhZFGzE+cL2kdAlIj:QcKoSsxzNDZL2Qiw+4868O8K/5Le1k34
Score
6/10
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 7 336 msiexec.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4504 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeShutdownPrivilege 4504 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 4504 EXCEL.EXE Token: SeSecurityPrivilege 336 msiexec.exe Token: SeCreateTokenPrivilege 4504 EXCEL.EXE Token: SeAssignPrimaryTokenPrivilege 4504 EXCEL.EXE Token: SeLockMemoryPrivilege 4504 EXCEL.EXE Token: SeIncreaseQuotaPrivilege 4504 EXCEL.EXE Token: SeMachineAccountPrivilege 4504 EXCEL.EXE Token: SeTcbPrivilege 4504 EXCEL.EXE Token: SeSecurityPrivilege 4504 EXCEL.EXE Token: SeTakeOwnershipPrivilege 4504 EXCEL.EXE Token: SeLoadDriverPrivilege 4504 EXCEL.EXE Token: SeSystemProfilePrivilege 4504 EXCEL.EXE Token: SeSystemtimePrivilege 4504 EXCEL.EXE Token: SeProfSingleProcessPrivilege 4504 EXCEL.EXE Token: SeIncBasePriorityPrivilege 4504 EXCEL.EXE Token: SeCreatePagefilePrivilege 4504 EXCEL.EXE Token: SeCreatePermanentPrivilege 4504 EXCEL.EXE Token: SeBackupPrivilege 4504 EXCEL.EXE Token: SeRestorePrivilege 4504 EXCEL.EXE Token: SeShutdownPrivilege 4504 EXCEL.EXE Token: SeDebugPrivilege 4504 EXCEL.EXE Token: SeAuditPrivilege 4504 EXCEL.EXE Token: SeSystemEnvironmentPrivilege 4504 EXCEL.EXE Token: SeChangeNotifyPrivilege 4504 EXCEL.EXE Token: SeRemoteShutdownPrivilege 4504 EXCEL.EXE Token: SeUndockPrivilege 4504 EXCEL.EXE Token: SeSyncAgentPrivilege 4504 EXCEL.EXE Token: SeEnableDelegationPrivilege 4504 EXCEL.EXE Token: SeManageVolumePrivilege 4504 EXCEL.EXE Token: SeImpersonatePrivilege 4504 EXCEL.EXE Token: SeCreateGlobalPrivilege 4504 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE 4504 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Website_Redesign_Project.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4504
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
PID:336