Analysis
-
max time kernel
143s -
max time network
147s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 07:15
Behavioral task
behavioral1
Sample
48005.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
48005.xls
Resource
win10v20201028
General
-
Target
48005.xls
-
Size
80KB
-
MD5
e0fcfaac8d385a1bcab28b834b9af2a0
-
SHA1
fcbbbb624a8903e4d4e69081fc1f1ccbd0958405
-
SHA256
aba105fe8ad27d96d744c4f5d2387feef994420bc55db7df3307c33cff080e30
-
SHA512
a6514afec518f1795b24a1b98e1d75ded765a46a5671c3ec3d528849ee6cf57c0fa98c4264a67cc9c029be6a445d7fc6c879d07619b70a7f9d8a0626a4f84d90
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
certutil.exerundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3932 3992 certutil.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1784 3992 rundll32.exe EXCEL.EXE -
Blocklisted process makes network request 4 IoCs
Processes:
rundll32.exeflow pid process 28 1672 rundll32.exe 30 1672 rundll32.exe 31 1672 rundll32.exe 33 1672 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1672 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3992 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE 3992 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
EXCEL.EXErundll32.exedescription pid process target process PID 3992 wrote to memory of 3932 3992 EXCEL.EXE certutil.exe PID 3992 wrote to memory of 3932 3992 EXCEL.EXE certutil.exe PID 3992 wrote to memory of 1784 3992 EXCEL.EXE rundll32.exe PID 3992 wrote to memory of 1784 3992 EXCEL.EXE rundll32.exe PID 1784 wrote to memory of 1672 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1672 1784 rundll32.exe rundll32.exe PID 1784 wrote to memory of 1672 1784 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\48005.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\System32\certutil.exe"C:\Windows\System32\certutil.exe" -decodehex C:\Users\Public\4875.txt C:\Users\Public\4875.dll2⤵
- Process spawned unexpected child process
PID:3932 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Public\4875.dll,D2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Public\4875.dll,D3⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1672
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
09aa345445d3b9770f913be946a56738
SHA12c745814ef7f3e1cefe6e468532422c5d0071aeb
SHA25637998fece4feb0a46bed59ef538fbfc61c457fa0187e42643e4a42aec94dbf77
SHA512054ed6d18943f6b581d39aef83b57179b1091344bf60ca7cdd060b10e62b693087076d77433353503685be96d94a19dde84c20c4db0d9c025280d90c716bb2f9
-
MD5
652620d75f7d14f0b5fb7adaef835c11
SHA1be88d1a4be7db5170f26cb3068783cb78ad92cf4
SHA256c8f9a6c0d639d9dbe1c432ca1415fa1129f7c1cda3e8febb4dc961763039a774
SHA5127ee326b9621285e412811cd01e829e789a89d8916cd39bb45eed92b82615e8595e704c30cfc674778f929249b387a510e0996c105e81eec56670871ca9da7f79
-
MD5
09aa345445d3b9770f913be946a56738
SHA12c745814ef7f3e1cefe6e468532422c5d0071aeb
SHA25637998fece4feb0a46bed59ef538fbfc61c457fa0187e42643e4a42aec94dbf77
SHA512054ed6d18943f6b581d39aef83b57179b1091344bf60ca7cdd060b10e62b693087076d77433353503685be96d94a19dde84c20c4db0d9c025280d90c716bb2f9