Analysis
-
max time kernel
137s -
max time network
139s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
06-10-2020 14:22
Static task
static1
Behavioral task
behavioral1
Sample
9d0a21ce53c6004f0caa583e2bcfbad4200eb7b3c9f5b2b68c8858592c7ec9d7.xls
Resource
win7
Behavioral task
behavioral2
Sample
9d0a21ce53c6004f0caa583e2bcfbad4200eb7b3c9f5b2b68c8858592c7ec9d7.xls
Resource
win10v200722
General
-
Target
9d0a21ce53c6004f0caa583e2bcfbad4200eb7b3c9f5b2b68c8858592c7ec9d7.xls
-
Size
1.6MB
-
MD5
213f9328ca43d51c50b74cdaaeca1ae5
-
SHA1
f7e7b5d5442328f615a707c78995e37fb0643af5
-
SHA256
9d0a21ce53c6004f0caa583e2bcfbad4200eb7b3c9f5b2b68c8858592c7ec9d7
-
SHA512
79977dd6d090ce44a0b59f0f17e5ea29e2e9f0c3cb17d9feb3d88bc29dfab752312b59bd8699b930d973d0d740984c5266fe9fdfd53a2fed9cd716772ec10264
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2820 500 WScript.exe 65 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 500 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE 500 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 500 wrote to memory of 2820 500 EXCEL.EXE 77 PID 500 wrote to memory of 2820 500 EXCEL.EXE 77
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\9d0a21ce53c6004f0caa583e2bcfbad4200eb7b3c9f5b2b68c8858592c7ec9d7.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:500 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\ProgramData\dot.jpegom.jse"2⤵
- Process spawned unexpected child process
PID:2820
-