Analysis
-
max time kernel
139s -
max time network
135s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
07/07/2020, 18:48
Static task
static1
Behavioral task
behavioral1
Sample
9adfacc46085440fe2b6372c6076ee02.xls
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
9adfacc46085440fe2b6372c6076ee02.xls
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
9adfacc46085440fe2b6372c6076ee02.xls
-
Size
178KB
-
MD5
9adfacc46085440fe2b6372c6076ee02
-
SHA1
ab433a4b1f0f2c2a2cd408df4bc4fce4b6ddd604
-
SHA256
b2ca2ad757620f4520942ab693eae848f2a714bb19ceac051ee61c376e524152
-
SHA512
923248c16fe317c680a01573fe45a7523f3030c584ba3406abb51f3cdd43703671efa46997e67726ce8775b9f24dfa735847bffddef323a317494276a4119340
Score
10/10
Malware Config
Signatures
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000_Classes\Local Settings explorer.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 860 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3808 860 explorer.exe 67 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 860 wrote to memory of 3808 860 EXCEL.EXE 71 PID 860 wrote to memory of 3808 860 EXCEL.EXE 71 PID 3024 wrote to memory of 3956 3024 explorer.exe 73 PID 3024 wrote to memory of 3956 3024 explorer.exe 73 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9adfacc46085440fe2b6372c6076ee02.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:860 -
C:\Windows\explorer.exeexplorer.exe C:\Users\Public\ixT.vbs2⤵
- Process spawned unexpected child process
PID:3808
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\ixT.vbs"2⤵PID:3956
-