Analysis
-
max time kernel
141s -
max time network
145s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
04/07/2020, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls
Resource
win7
Behavioral task
behavioral2
Sample
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls
Resource
win10v200430
General
-
Target
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls
-
Size
2.6MB
-
MD5
5e88543265f45782ccd0d313d1f9fdc0
-
SHA1
1006e031aaea7bd841141574fdefb49b051b12b2
-
SHA256
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c
-
SHA512
96a456e52578203f244a07c51af3f1d0dbb3beeaa202896710b4b976d99c87501e447130f23faeb6b1ee11dbdb98affdefa2b66b1e64f0cfbf71f506a67b28bb
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2536 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2200 2536 wscript.exe 65 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2200 2536 EXCEL.EXE 75 PID 2536 wrote to memory of 2200 2536 EXCEL.EXE 75 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\yy:Zone.Identifier EXCEL.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\xx:Zone.Identifier EXCEL.EXE File created C:\programdata\asc.txt:script1.vbs EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE 2536 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe C:\programdata\asc.txt:script1.vbs2⤵
- Process spawned unexpected child process
PID:2200
-