Analysis
-
max time kernel
139s -
max time network
136s -
platform
windows10_x64 -
resource
win10 -
submitted
13-07-2020 20:00
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.6586.xls
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.6586.xls
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.6586.xls
-
Size
300KB
-
MD5
ee4e4354a83b4f83ce02d43d3d62f605
-
SHA1
91c416665c0d3265ce241e745a146f5c2ea8b7ba
-
SHA256
37bae39cdd152ba0ad9c8661f7fa2740fd23c5d4f4666a560d11a0100da100e7
-
SHA512
8630fe21d22767606897aa501e9e1368178f63a0ccb566b2707b1d864dc1083de4d24e398291b99b00884559b8fcaa24f1b85b16709302f23dac40aadcb864e0
Score
10/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3104 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2892 3104 rundll32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3104 wrote to memory of 2892 3104 EXCEL.EXE 71 PID 3104 wrote to memory of 2892 3104 EXCEL.EXE 71 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Enumerates connected drives 3 TTPs
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.6586.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3104 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\WbMFNqE\DTXZRqG\fytiOXY.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:2892
-