Analysis

  • max time kernel
    34s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    15/07/2020, 21:37

General

  • Target

    SecuriteInfo.com.005690e01.30926.xls

  • Size

    298KB

  • MD5

    0983f5f90c2c6b305e27d357873c6552

  • SHA1

    19e996fb068bad7cbfd1ff373f104a45f159b0f5

  • SHA256

    48eb94cc491f59b951a2753961864dd0d6257d96e0ba0862a302399cd1e7dba4

  • SHA512

    e400695841f024582e3a6e567db60a3f0011a89dbbe3eb2417039d7f5841bb74670b8c95570c0fb302a6aceacb45070f64fac5a675ff3ebc1bf98596666c3d2d

Score
8/10

Malware Config

Signatures

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.005690e01.30926.xls"
    1⤵
    • Enumerates system info in registry
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of WriteProcessMemory
    • Checks processor information in registry
    PID:3044
    • C:\IqpdPqN\ZnVmYdD\xshCsjw.exe
      "C:\IqpdPqN\ZnVmYdD\xshCsjw.exe"
      2⤵
      • Executes dropped EXE
      PID:3416

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads