Analysis
-
max time kernel
136s -
max time network
145s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 20:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.4346.xls
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.4346.xls
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.4346.xls
-
Size
303KB
-
MD5
384253a9cb2f48ef6e8438c20c477d03
-
SHA1
e02d78fe03c3c5d14f4692671a6e4aba1f9decfb
-
SHA256
1b409ff846a2f5f8d223166f8cfef47db4c21fd993f4fcf0218f6e6cc6634dbd
-
SHA512
fbcb6036a26475173e8983771da0bbf808d5064e16473eda676fee627b5198ec865d62020ba1b71201355940bd3aeee5a7800fdba9477631cf0b70e34e07cee7
Score
10/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs
-
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE 3816 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3816 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 860 3816 rundll32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3816 wrote to memory of 860 3816 EXCEL.EXE 71 PID 3816 wrote to memory of 860 3816 EXCEL.EXE 71 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.4346.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3816 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\WbMFNqE\DTXZRqG\fytiOXY.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:860
-