Analysis
-
max time kernel
135s -
max time network
137s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-03-2021 21:43
Behavioral task
behavioral1
Sample
CompensationClaim_1458474084_03152021.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
CompensationClaim_1458474084_03152021.xls
Resource
win10v20201028
General
-
Target
CompensationClaim_1458474084_03152021.xls
-
Size
233KB
-
MD5
1a9610dd6bbe276109581299f12a8a25
-
SHA1
8dc20d17ee1e1a8df8ec15f47fdc6989131f3d49
-
SHA256
8688077ce747fd951e0059760c195bc19ef8a75276a1796645bec13cc76f87e8
-
SHA512
d2f01cf951cf497940a08f049abc2e51724a358eee3f19015f3464f50eb38083adb4fda92ba9152e9e912a036989a249188a3afbeb584925c92b8681576eb326
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
Rundll32.exeRundll32.exeRundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3828 880 Rundll32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3932 880 Rundll32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3920 880 Rundll32.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 880 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
EXCEL.EXEpid process 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE 880 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 880 wrote to memory of 3828 880 EXCEL.EXE Rundll32.exe PID 880 wrote to memory of 3828 880 EXCEL.EXE Rundll32.exe PID 880 wrote to memory of 3932 880 EXCEL.EXE Rundll32.exe PID 880 wrote to memory of 3932 880 EXCEL.EXE Rundll32.exe PID 880 wrote to memory of 3920 880 EXCEL.EXE Rundll32.exe PID 880 wrote to memory of 3920 880 EXCEL.EXE Rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\CompensationClaim_1458474084_03152021.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SYSTEM32\Rundll32.exeRundll32 ..\SOT.GOT,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:3828 -
C:\Windows\SYSTEM32\Rundll32.exeRundll32 ..\SOT.GOT1,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:3932 -
C:\Windows\SYSTEM32\Rundll32.exeRundll32 ..\SOT.GOT2,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:3920