Analysis

  • max time kernel
    148s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    24-06-2020 14:57

General

  • Target

    COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr

  • Size

    1.4MB

  • MD5

    c6bed0ae958f524c96ea66abe4388143

  • SHA1

    e004388f83243650ed3dd97564d0ba7461560538

  • SHA256

    690fd66b2d2844fa4bd98c0b1f79fbf7fe9c38c5f187d1ee05757bda9c28984e

  • SHA512

    ea286c26a54ecbfc21507b9128b47646a331c07602b99d87a84166662d32a650bcb5f2c13052304119aa3845566c4bbaa9c8eed47e3aecc17cc6b44851bcf741

Score
7/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Drops startup file 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr
    "C:\Users\Admin\AppData\Local\Temp\COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr" /S
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Drops startup file
    PID:1092
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Adds Run entry to start application
      • Suspicious use of SetWindowsHookEx
      PID:1128

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1128-0-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/1128-1-0x000000000043379E-mapping.dmp
  • memory/1128-2-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB