Analysis

  • max time kernel
    74s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    05-03-2021 12:29

General

  • Target

    document-386407988.xls

  • Size

    39KB

  • MD5

    1fa4dc11ca13bb6b0007697ea948d103

  • SHA1

    34490a498d48b0aa3a8714811f72359f1e68b633

  • SHA256

    d90f43e55fea4004620ef90b8a8440493e23e4035b208afaaff7262453217903

  • SHA512

    0852782c9db46fff15a6a5c82f29f79d49593ae0109109aa3d0e186ab1a3c7ab0e440a4803b847bd36c75132a71fe0ceb9332aac0d8ba2e6c1bd2b65356bdf87

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://dzw10jpcgj03fckc.com/inda.xls

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\document-386407988.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:292
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 ..\fkruf.djr,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:1156
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:1636

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/292-2-0x000000002F411000-0x000000002F414000-memory.dmp
      Filesize

      12KB

    • memory/292-3-0x0000000071CE1000-0x0000000071CE3000-memory.dmp
      Filesize

      8KB

    • memory/292-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/292-5-0x0000000002050000-0x0000000002051000-memory.dmp
      Filesize

      4KB

    • memory/1156-8-0x0000000000000000-mapping.dmp
    • memory/1156-9-0x0000000076861000-0x0000000076863000-memory.dmp
      Filesize

      8KB

    • memory/1636-10-0x0000000000000000-mapping.dmp
    • memory/1636-11-0x000007FEFC4E1000-0x000007FEFC4E3000-memory.dmp
      Filesize

      8KB

    • memory/1752-7-0x000007FEF6B80000-0x000007FEF6DFA000-memory.dmp
      Filesize

      2.5MB