Analysis

  • max time kernel
    141s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    24-06-2020 14:57

General

  • Target

    COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr

  • Size

    1.4MB

  • MD5

    c6bed0ae958f524c96ea66abe4388143

  • SHA1

    e004388f83243650ed3dd97564d0ba7461560538

  • SHA256

    690fd66b2d2844fa4bd98c0b1f79fbf7fe9c38c5f187d1ee05757bda9c28984e

  • SHA512

    ea286c26a54ecbfc21507b9128b47646a331c07602b99d87a84166662d32a650bcb5f2c13052304119aa3845566c4bbaa9c8eed47e3aecc17cc6b44851bcf741

Score
7/10

Malware Config

Signatures

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr
    "C:\Users\Admin\AppData\Local\Temp\COVID-19 PALLIATIVES BONUS ON PAGA.xlsx.scr" /S
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    • Drops startup file
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    PID:3904
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\MSBuild.exe
      "C:\\\\Windows\\\\Microsoft.NET\\\\Framework\\\\v2.0.50727\\\\MSBuild.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: GetForegroundWindowSpam
      • Adds Run entry to start application
      PID:3956

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3956-0-0x0000000000400000-0x0000000000438000-memory.dmp
    Filesize

    224KB

  • memory/3956-1-0x000000000043379E-mapping.dmp