Analysis
-
max time kernel
138s -
max time network
149s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15-07-2020 21:06
Static task
static1
Behavioral task
behavioral1
Sample
File_0008656.xls
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
File_0008656.xls
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
File_0008656.xls
-
Size
341KB
-
MD5
26452ff471bf557d0e6d01a6d65517b5
-
SHA1
c5f89cecc9b9a7baeff94c922b21afa30e7836b7
-
SHA256
a72d63cc39282fc2f056979dcbfa503a57359946f8f527cc7615938fd21ca73a
-
SHA512
f7aff1fda98dbebe99dd867498dcb8f95eb9314541794e1b3a15210c7f10c5edb23e1ed727020a527dc816cfd3e0cbac64e3c3259f960007f1ecfbe7905a46ef
Score
10/10
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Enumerates connected drives 3 TTPs
-
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE 1612 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1612 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4020 1612 rundll32.exe 67 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1612 wrote to memory of 4020 1612 EXCEL.EXE 74 PID 1612 wrote to memory of 4020 1612 EXCEL.EXE 74 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\File_0008656.xls"1⤵
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
PID:1612 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\RbwKxjL\hgIpHsw\hSzCWyE.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:4020
-