Analysis
-
max time kernel
136s -
max time network
135s -
platform
windows10_x64 -
resource
win10 -
submitted
13/07/2020, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.9507.xls
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.9507.xls
Resource
win10
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.9507.xls
-
Size
294KB
-
MD5
c4d00a8c5a19c0cd416bc3dee1fbad59
-
SHA1
0e0f4007f44fad588a6730c34e2f1489fb4faea0
-
SHA256
a8f983eaa6a03d1837cc9d85c25cb152cd140540755fcd3307a5e50e73df1171
-
SHA512
8d9a8cdae3af0639609e44b0bd82330bb01809ff5425dc3633fdeefa39e92d7bf844b66488b3df6b6a5bc1ae43809d9633793121c64b9b5c05ecae40f35946a1
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3796 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 900 3796 rundll32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3796 wrote to memory of 900 3796 EXCEL.EXE 71 PID 3796 wrote to memory of 900 3796 EXCEL.EXE 71 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Enumerates connected drives 3 TTPs
-
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE 3796 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.9507.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3796 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\WbMFNqE\DTXZRqG\fytiOXY.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:900
-