Analysis
-
max time kernel
75s -
max time network
145s -
platform
windows10_x64 -
resource
win10 -
submitted
09/07/2020, 07:06
Static task
static1
Behavioral task
behavioral1
Sample
IRS_Tax_8346349.xls
Resource
win7v200430
Behavioral task
behavioral2
Sample
IRS_Tax_8346349.xls
Resource
win10
General
-
Target
IRS_Tax_8346349.xls
-
Size
85KB
-
MD5
18354afc1b95a90fcd02d608c2306a4a
-
SHA1
3b864eb00b8cb4303486476d67c762d46045dbb3
-
SHA256
7b18c2d4f575a034a2e175de3095170513e0f14ae2be151a0919ec569cb91a8c
-
SHA512
c10237937b16367640eca7a9b0221641a2e2154f6e7a20f9bdc62dd3522c23935d788d68c1dc6f0a8c47ea0984d217ab361021ee01a9452400fefec0ec549f65
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3588 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3588 EXCEL.EXE 3588 EXCEL.EXE 3696 dwwin.exe 3696 dwwin.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 736 3588 DW20.EXE 66 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3588 wrote to memory of 736 3588 EXCEL.EXE 71 PID 3588 wrote to memory of 736 3588 EXCEL.EXE 71 PID 736 wrote to memory of 3696 736 DW20.EXE 72 PID 736 wrote to memory of 3696 736 DW20.EXE 72 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\IRS_Tax_8346349.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3588 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 43682⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 43683⤵
- Suspicious behavior: EnumeratesProcesses
PID:3696
-
-