Analysis
-
max time kernel
32s -
max time network
147s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
15-07-2020 18:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.005690e01.12571.xls
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.005690e01.12571.xls
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.005690e01.12571.xls
-
Size
288KB
-
MD5
2df1af531f51dc81b43b17ad7ab8a119
-
SHA1
189054c4533ab7bf40339579f5d596b9a1d31c9c
-
SHA256
0ba3b4a72f574836f428b6f532b59c38e2ccac692b04bb93e5a19e2621656668
-
SHA512
c80af1a0c8aeed3eb9170c245e9d73df6c7063a1c31bbb2eeda5346c25f082789a55cebd23bbb6da41b3833e74aee55a71f417017ee099ae5d5c0146f93a24cf
Score
8/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3908 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3908 wrote to memory of 3804 3908 EXCEL.EXE 71 PID 3908 wrote to memory of 3804 3908 EXCEL.EXE 71 PID 3908 wrote to memory of 3804 3908 EXCEL.EXE 71 -
Executes dropped EXE 1 IoCs
pid Process 3804 xshCsjw.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.005690e01.12571.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
PID:3908 -
C:\IqpdPqN\ZnVmYdD\xshCsjw.exe"C:\IqpdPqN\ZnVmYdD\xshCsjw.exe"2⤵
- Executes dropped EXE
PID:3804
-