Analysis
-
max time kernel
116s -
max time network
122s -
platform
windows7_x64 -
resource
win7 -
submitted
13-07-2020 20:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.17780.xls
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.17780.xls
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.17780.xls
-
Size
295KB
-
MD5
405bb15c0a415c57b9dab50a6091c9ff
-
SHA1
ac32a14b6e71c6db7947b02554ef82986157c98a
-
SHA256
fd8aec0158da8e2d9e0d3bbc78c9bf73e72613e09bf385d728438a3dd89dd665
-
SHA512
6590a4176a7f934af417ff12ecb39d8806bee8757e50a27a4b6e9a517896461d0536c56956878fb71b61bf216d785a11323a8f1a5ae5afa4f9fb19a6e28fb68e
Score
6/10
Malware Config
Signatures
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 864 dwwin.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1496 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1496 EXCEL.EXE 1496 EXCEL.EXE 1496 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1496 EXCEL.EXE -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 752 1496 DW20.EXE 23 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1496 wrote to memory of 752 1496 EXCEL.EXE 24 PID 1496 wrote to memory of 752 1496 EXCEL.EXE 24 PID 1496 wrote to memory of 752 1496 EXCEL.EXE 24 PID 1496 wrote to memory of 752 1496 EXCEL.EXE 24 PID 1496 wrote to memory of 752 1496 EXCEL.EXE 24 PID 752 wrote to memory of 864 752 DW20.EXE 25 PID 752 wrote to memory of 864 752 DW20.EXE 25 PID 752 wrote to memory of 864 752 DW20.EXE 25
Processes
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.17780.xls1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE"C:\PROGRA~1\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 11602⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 11603⤵
- Suspicious behavior: GetForegroundWindowSpam
PID:864
-
-