Analysis
-
max time kernel
136s -
max time network
150s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13-07-2020 14:29
Static task
static1
Behavioral task
behavioral1
Sample
674457.xlsm
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
674457.xlsm
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
674457.xlsm
-
Size
48KB
-
MD5
7dea468f495bfad5b8eacb2abe0ecd27
-
SHA1
9da52def8e221d8e9d394931e77fd5441930f351
-
SHA256
1943b72d34dbaf3abb226d62d68a4d27fe012c8a978ef1d32e393172d4b201d7
-
SHA512
9658a234116bbc5ac22a9b6c26d8a73c9b133cc51716f8f6bf2ec36f021f4d6b60fe5734942099ba1c78ecb74176b7f47985d792396bf7e317c891d582f12169
Score
10/10
Malware Config
Signatures
-
Script User-Agent 1 IoCs
description flow ioc HTTP User-Agent header 20 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Executes dropped EXE 1 IoCs
pid Process 3656 16hDd9iAu.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1996 3656 WerFault.exe 76 -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1996 WerFault.exe Token: SeBackupPrivilege 1996 WerFault.exe Token: SeDebugPrivilege 1996 WerFault.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE 1316 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1316 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3448 1316 cscript.exe 67 -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 1316 wrote to memory of 3448 1316 EXCEL.EXE 72 PID 1316 wrote to memory of 3448 1316 EXCEL.EXE 72 PID 3448 wrote to memory of 3656 3448 cscript.exe 76 PID 3448 wrote to memory of 3656 3448 cscript.exe 76 PID 3448 wrote to memory of 3656 3448 cscript.exe 76 -
Blacklisted process makes network request 1 IoCs
flow pid Process 20 3448 cscript.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe 1996 WerFault.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\mm:Zone.Identifier EXCEL.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\xx:Zone.Identifier EXCEL.EXE File created C:\programdata\asc.txt:script1.vbs EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\674457.xlsm"1⤵
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Enumerates system info in registry
- NTFS ADS
PID:1316 -
C:\Windows\system32\cscript.exe"C:\Windows\system32\cscript.exe" C:\programdata\asc.txt:script1.vbs2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
PID:3448 -
C:\programdata\16hDd9iAu.exeC:\programdata\16hDd9iAu.exe3⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3656 -s 11604⤵
- Program crash
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
-