Analysis
-
max time kernel
17s -
max time network
131s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
16-11-2020 13:39
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_005241060.xlsm
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Invoice_005241060.xlsm
Resource
win10v20201028
General
-
Target
Invoice_005241060.xlsm
-
Size
29KB
-
MD5
ef3b7f93392bee34ef3a27b9dd95b148
-
SHA1
f35848fdcc1900e68d7bae5818f0dbe6b58ebe48
-
SHA256
406ae986c72382231fae46850d054ce174f5a70ccf948d21d8e48663c16ec081
-
SHA512
57f6386b615406f2768b9837889dfe00bf17d04d63505f22eee49725c0ee57adda790bcbff38ca388e025df2b8e51e3d924029c666711d3da32a182157ae4220
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
WerFault.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 988 1304 WerFault.exe EXCEL.EXE -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 988 created 1304 988 WerFault.exe EXCEL.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 988 1304 WerFault.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1304 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
Processes:
WerFault.exepid process 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe 988 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 988 WerFault.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 1304 EXCEL.EXE 1304 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE 1304 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice_005241060.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1304 -s 12162⤵
- Process spawned unexpected child process
- Suspicious use of NtCreateProcessExOtherParentProcess
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/988-7-0x00000129E5DB0000-0x00000129E5DB1000-memory.dmpFilesize
4KB
-
memory/988-8-0x00000129E5DB0000-0x00000129E5DB1000-memory.dmpFilesize
4KB
-
memory/988-10-0x00000129E6B20000-0x00000129E6B21000-memory.dmpFilesize
4KB
-
memory/988-11-0x00000129E6B20000-0x00000129E6B21000-memory.dmpFilesize
4KB
-
memory/1304-0-0x00007FF8D9B90000-0x00007FF8DA1C7000-memory.dmpFilesize
6.2MB
-
memory/1304-5-0x0000023727DCA000-0x0000023727DCE000-memory.dmpFilesize
16KB
-
memory/1304-4-0x0000023727DCA000-0x0000023727DCE000-memory.dmpFilesize
16KB
-
memory/1304-3-0x0000023727DC6000-0x0000023727DCA000-memory.dmpFilesize
16KB
-
memory/1304-2-0x000002372383F000-0x0000023723844000-memory.dmpFilesize
20KB
-
memory/1304-6-0x0000023727DCA000-0x0000023727DCE000-memory.dmpFilesize
16KB