Analysis
-
max time kernel
138s -
max time network
132s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07-07-2020 18:55
Static task
static1
Behavioral task
behavioral1
Sample
payment_752.xls
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
payment_752.xls
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
payment_752.xls
-
Size
148KB
-
MD5
8e27f25d7c56eb111e6e60b735562ce5
-
SHA1
ea8aa1d15c8c3a480ca553c9c514256d6b0a5c95
-
SHA256
5ed3ae3b34dc28e9f04dbc880a62a3595f3ac6f5c8d133917f15a98b17f121fc
-
SHA512
a4335f5f25bbbc4005f638536936280eba51e21239dada04b76edc12ab40dc3ceacf60c56cd899280fd3eb79c46761f2cd209a5b8b46c1932c00661dc9ee3cca
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3840 2804 explorer.exe 65 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2804 wrote to memory of 3840 2804 EXCEL.EXE 72 PID 2804 wrote to memory of 3840 2804 EXCEL.EXE 72 PID 3972 wrote to memory of 1476 3972 explorer.exe 74 PID 3972 wrote to memory of 1476 3972 explorer.exe 74 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE 2804 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2804 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\payment_752.xls"1⤵
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:2804 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Admin\AppData\Local\Temp\tZrm.vbs2⤵
- Process spawned unexpected child process
PID:3840
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
- Modifies registry class
PID:3972 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tZrm.vbs"2⤵PID:1476
-