Analysis
-
max time kernel
111s -
max time network
6s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
12-05-2020 18:52
Behavioral task
behavioral1
Sample
offer_05634.xlsm
Resource
win7v200430
Behavioral task
behavioral2
Sample
offer_05634.xlsm
Resource
win10v200430
General
-
Target
offer_05634.xlsm
-
Size
115KB
-
MD5
3e0bbe29e435b2a5bf66091b2bc4efcf
-
SHA1
af4abd629cf997d80e2a57a37c4fd6408097e324
-
SHA256
27ba6b6b56747320708fc658ba659bc5d3f77545453ee879cfc6ae210636786c
-
SHA512
1acd893cd2d57573221dec7ec553eb7f513902d34c8669c15469ec1ca5829d6524cc5c4623c9cf39e863d6203e83343ac1915d2ee24a6be0a2eafdfa353d5c4c
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1284 316 DW20.EXE EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 316 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
EXCEL.EXEpid process 316 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dwwin.exepid process 1400 dwwin.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 316 EXCEL.EXE 316 EXCEL.EXE 316 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEDW20.EXEdescription pid process target process PID 316 wrote to memory of 1284 316 EXCEL.EXE DW20.EXE PID 316 wrote to memory of 1284 316 EXCEL.EXE DW20.EXE PID 316 wrote to memory of 1284 316 EXCEL.EXE DW20.EXE PID 316 wrote to memory of 1284 316 EXCEL.EXE DW20.EXE PID 316 wrote to memory of 1284 316 EXCEL.EXE DW20.EXE PID 1284 wrote to memory of 1400 1284 DW20.EXE dwwin.exe PID 1284 wrote to memory of 1400 1284 DW20.EXE dwwin.exe PID 1284 wrote to memory of 1400 1284 DW20.EXE dwwin.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\offer_05634.xlsm1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 11762⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 11763⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:1400
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
069022acc43bc1cee64725cbf7f1a5c7
SHA1f904c200fb290ee4b4bf4e4a23fb9a7040b15803
SHA256369e2273f989400684bfd753959cb5ecd6817452ae7b7749a9bfb81eda7f50a0
SHA512da056c1b48671777ed73c6ea3c6f73486d5d3f45a3292722aad21ad2811e95891836bac78a318467a709d8308ada4314d5b2c024f1bd0b10e7db966d6b9a900d