Analysis
-
max time kernel
46s -
max time network
132s -
platform
windows10_x64 -
resource
win10 -
submitted
15/07/2020, 18:45
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.005690e01.19647.xls
Resource
win7v200430
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
SecuriteInfo.com.005690e01.19647.xls
Resource
win10
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.005690e01.19647.xls
-
Size
295KB
-
MD5
78a3ec07db053e40f2b98eca107f30a3
-
SHA1
0a56a0cf7ce51cdddbfd599cc3278d070f98495b
-
SHA256
b0def7738227cc7d0031fa98d017d5549037510cb45ca2e5f6544eabd3e827ef
-
SHA512
da7694cd3805226e78d73a83b4240dc92c51e6758e1e1a6f28d062b1d551bebd64264d233f3e3f64b30fb993a5e8fdd242897724bd77895a64b454a7c4de50e7
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2876 xshCsjw.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE 2532 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2532 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2876 2532 EXCEL.EXE 71 PID 2532 wrote to memory of 2876 2532 EXCEL.EXE 71 PID 2532 wrote to memory of 2876 2532 EXCEL.EXE 71
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.005690e01.19647.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\IqpdPqN\ZnVmYdD\xshCsjw.exe"C:\IqpdPqN\ZnVmYdD\xshCsjw.exe"2⤵
- Executes dropped EXE
PID:2876
-