Analysis
-
max time kernel
135s -
max time network
128s -
platform
windows10_x64 -
resource
win10 -
submitted
17-07-2020 08:26
Static task
static1
Behavioral task
behavioral1
Sample
inv_9.xls
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
inv_9.xls
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
inv_9.xls
-
Size
603KB
-
MD5
e511d5d44cf2910cb1d6245d2f3652aa
-
SHA1
bd1addabe7755fa3116942bbc9c190c77f25c0db
-
SHA256
4f8696a9fa832771c2e0a561ec5b12e0bde3f0afeda049c7e53ffc1b56e7bb09
-
SHA512
16ee8ec4ad8201a39ce79b30275ef1cc9ea9299dde3005557c501e9fb89acafdf14ececf35d4afd0fe66b035f22c99be910ac997d4594112fe52a74e8654f910
Score
10/10
Malware Config
Signatures
-
Enumerates connected drives 3 TTPs
-
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE 3908 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3908 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3816 3908 regsvr32.exe 66 -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3908 wrote to memory of 3816 3908 EXCEL.EXE 71 PID 3908 wrote to memory of 3816 3908 EXCEL.EXE 71 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\inv_9.xls"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
PID:3908 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s /i CztMJfC.ocx2⤵
- Process spawned unexpected child process
PID:3816
-