Analysis
-
max time kernel
138s -
max time network
133s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
17/07/2020, 00:47
Static task
static1
Behavioral task
behavioral1
Sample
Services_rate_202051.xlsm
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Services_rate_202051.xlsm
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Services_rate_202051.xlsm
-
Size
42KB
-
MD5
3699b8a1b21b70074b0dde8499a69b20
-
SHA1
95c06737811298d9daa7cae20ef745ec5c25e1c9
-
SHA256
615e421907dd0df60c97b502690fc57bdb08365122e3cafe79ac911e9f204feb
-
SHA512
1787c9a1a46f02757f7273409514b7283dd13e91b8173c236ed311938b0d36192cb99d2c5c0b3bc87c7222858e00bdbfbb86855aee39a89db5d83897d38bdbfc
Score
10/10
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Enumerates connected drives 3 TTPs
-
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE 1508 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1508 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3092 1508 rundll32.exe 67 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1508 wrote to memory of 3092 1508 EXCEL.EXE 74 PID 1508 wrote to memory of 3092 1508 EXCEL.EXE 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Services_rate_202051.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\QauJviJ\feHnFrv\fQxzUwC.dll,StartW2⤵
- Process spawned unexpected child process
PID:3092
-