Analysis
-
max time kernel
80s -
max time network
145s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
19/10/2020, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
document-1434010420.xls
Resource
win7
Behavioral task
behavioral2
Sample
document-1434010420.xls
Resource
win10v200722
General
-
Target
document-1434010420.xls
-
Size
426KB
-
MD5
b72b21f34eb10c7bca626841e7c4cf30
-
SHA1
a896bcd44a6ba32ce2c390f636bf9db302c0be83
-
SHA256
510334dab44ec3a2ab0ff8367d7f9b96760049275ae9d49baef669b6c3409328
-
SHA512
5de04a4b79428a022802e31b90300bc8537d45bacac9b3170f6578c7594d6e846e165d183314177215f9598f7db50d1e623bd87b1ccd84a2b06f6f7ab3afe0c9
Malware Config
Signatures
-
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2904 3828 DW20.EXE 65 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3828 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3828 EXCEL.EXE 3828 EXCEL.EXE 2156 dwwin.exe 2156 dwwin.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3828 EXCEL.EXE 3828 EXCEL.EXE 3828 EXCEL.EXE 3828 EXCEL.EXE 3828 EXCEL.EXE 3828 EXCEL.EXE 3828 EXCEL.EXE 3828 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3828 wrote to memory of 2904 3828 EXCEL.EXE 79 PID 3828 wrote to memory of 2904 3828 EXCEL.EXE 79 PID 2904 wrote to memory of 2156 2904 DW20.EXE 80 PID 2904 wrote to memory of 2156 2904 DW20.EXE 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\document-1434010420.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 46442⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 46443⤵
- Suspicious behavior: EnumeratesProcesses
PID:2156
-
-