Analysis

  • max time kernel
    139s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-01-2021 06:26

General

  • Target

    Mv Maersk Kleven V949E.xlsx

  • Size

    2.2MB

  • MD5

    6f9c071d241b667471112d7ac12a95a1

  • SHA1

    43988263671b7f696dc63c4e87f9a034efb5d31a

  • SHA256

    4bed0018133b549db2caeff1d8902e4b8c74188b3671d099f8206168d8e7aeca

  • SHA512

    7bc3c032de74041d15c467dba7fda004c65bd6fa383db2824f0ba97de498be8cbad44b3e8d962583d1efa368fabd258a30ea739055ea482cbc97f3e69dd193d5

Score
5/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Mv Maersk Kleven V949E.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:496

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/496-2-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-3-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-4-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB

  • memory/496-5-0x00007FF8090E0000-0x00007FF809717000-memory.dmp
    Filesize

    6.2MB

  • memory/496-6-0x00007FF7E5FB0000-0x00007FF7E5FC0000-memory.dmp
    Filesize

    64KB