Analysis
-
max time kernel
96s -
max time network
143s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
09-04-2020 15:40
Static task
static1
Behavioral task
behavioral1
Sample
9ef8631578196747fe6198a97c0ceb20.xls
Resource
win7v200217
Behavioral task
behavioral2
Sample
9ef8631578196747fe6198a97c0ceb20.xls
Resource
win10v200217
General
-
Target
9ef8631578196747fe6198a97c0ceb20.xls
-
Size
72KB
-
MD5
9ef8631578196747fe6198a97c0ceb20
-
SHA1
5eebe8e0a1c50e54391618b83a917e7f32b18bf8
-
SHA256
5a21120c9bd779786888f9d4d2a138836e627f001dbacc80c2b035ff7d198715
-
SHA512
04c7c0ecf6ad26546155218886188d5fc444c2067f9f28246094ad15fb5e4f1b0026fbc220ca18a2f34ba6f7629d371487b7dacfdbd6e4955fa64009e012a62f
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3992 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
EXCEL.EXEdwwin.exepid process 3992 EXCEL.EXE 3992 EXCEL.EXE 2168 dwwin.exe 2168 dwwin.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3264 3992 DW20.EXE EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEDW20.EXEdescription pid process target process PID 3992 wrote to memory of 3264 3992 EXCEL.EXE DW20.EXE PID 3992 wrote to memory of 3264 3992 EXCEL.EXE DW20.EXE PID 3264 wrote to memory of 2168 3264 DW20.EXE dwwin.exe PID 3264 wrote to memory of 2168 3264 DW20.EXE dwwin.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
Processes:
EXCEL.EXEpid process 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9ef8631578196747fe6198a97c0ceb20.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Enumerates system info in registry
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
PID:3992 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 45842⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 45843⤵
- Suspicious behavior: EnumeratesProcesses
PID:2168
-
-