Analysis
-
max time kernel
137s -
max time network
135s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
13/07/2020, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.DOC.Kryptik.Q.13895.xls
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.DOC.Kryptik.Q.13895.xls
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.DOC.Kryptik.Q.13895.xls
-
Size
293KB
-
MD5
a402ee26ec56afffa6f638b9cfa2e646
-
SHA1
f4db2a82f5dad24e4a6260e463b4ce7fbb37c802
-
SHA256
da21cec62d9b7cf3e162b4e6a6e8d29262280e57f423860a8052c4512304186f
-
SHA512
a6221a2e19e1d9f95942e07410c1f3aca181d28dfb51e60f7c19f9eff3977ada2bb3e3ec892c4c2271854a3d750ffb58c8eb6f6a5f30e5af4e40c03e80a11759
Score
10/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE 1492 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1492 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3916 1492 rundll32.exe 67 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1492 wrote to memory of 3916 1492 EXCEL.EXE 72 PID 1492 wrote to memory of 3916 1492 EXCEL.EXE 72
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.DOC.Kryptik.Q.13895.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\WbMFNqE\DTXZRqG\fytiOXY.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:3916
-