Analysis
-
max time kernel
139s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
10-04-2020 08:18
Static task
static1
Behavioral task
behavioral1
Sample
William Smith Resume.xls
Resource
win7v200217
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
William Smith Resume.xls
Resource
win10v200217
windows10_x64
0 signatures
0 seconds
General
-
Target
William Smith Resume.xls
-
Size
163KB
-
MD5
0a054818926d97f4100774255a908dba
-
SHA1
de572eddd30b34d1e328c8d5fb986cc1e04c82e8
-
SHA256
0fba1f02cd2872efc4cdc6806bc49d786005f590971ee31f97ce71c1ccf87fe2
-
SHA512
21659d1132eef51aaf43f7c3dffde06e7018e7d9847c7a7106eb9aee2747f9c6a967a80ab052db17903b0ac9cb63ee3c8371725f4206decff13dbbe996bcf3f1
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3216 3968 rundll32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3216 3968 EXCEL.EXE 74 PID 3968 wrote to memory of 3216 3968 EXCEL.EXE 74 -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE 3968 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3968 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\William Smith Resume.xls"1⤵
- Suspicious use of WriteProcessMemory
- Enumerates system info in registry
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:3968 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\ieTneVi.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:3216
-