Analysis
-
max time kernel
71s -
max time network
133s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
08/07/2020, 21:02
Static task
static1
Behavioral task
behavioral1
Sample
IRS_Sheet_5609567.xls
Resource
win7
Behavioral task
behavioral2
Sample
IRS_Sheet_5609567.xls
Resource
win10v200430
General
-
Target
IRS_Sheet_5609567.xls
-
Size
78KB
-
MD5
2bbc0cd25fd17a20905533745d37cafa
-
SHA1
5310336b56430a42fb652e40a6b09fa1aa004ce8
-
SHA256
3574b67e84e558069610e38049cc5e17d832c8bb012ba5844ebc4aff0c41bf27
-
SHA512
6c51cf99c144cc66a4694305f16829aabc4aecb3b5e87f7352039e9c54096352f9fd3ef01110eb0e8e3b8111e2166abc364e971a6b4f0c1ee49d56598e0d09b9
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE 2564 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2564 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2564 EXCEL.EXE 2564 EXCEL.EXE 8 dwwin.exe 8 dwwin.exe 2564 EXCEL.EXE 2564 EXCEL.EXE -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1924 2564 DW20.EXE 65 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2564 wrote to memory of 1924 2564 EXCEL.EXE 69 PID 2564 wrote to memory of 1924 2564 EXCEL.EXE 69 PID 1924 wrote to memory of 8 1924 DW20.EXE 70 PID 1924 wrote to memory of 8 1924 DW20.EXE 70
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\IRS_Sheet_5609567.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 44922⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 44923⤵
- Suspicious behavior: EnumeratesProcesses
PID:8
-
-