Analysis

  • max time kernel
    135s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    16-03-2021 05:47

General

  • Target

    notif_2227.xlsb

  • Size

    67KB

  • MD5

    b9331085a13ece7ef497f93dcd2741d6

  • SHA1

    c8a844989501bf3e47266d4d5a5e083856bb0feb

  • SHA256

    07f7f5ac05c7d09206105d3827cdf09e69575f74a0337824ffb0c7fa19dbac0a

  • SHA512

    6f4720aa130e45f0c8b1f1f04ae1041c74d4646a04e23e2dd23400333f123b3c3838986e68e101649933951c73665e9bf5d766f762362bea71f3e00d450e0e11

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\notif_2227.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:\YmiReEE\foBcwbz\KCmUWqT.dll,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3096

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3096-7-0x0000000000000000-mapping.dmp

  • memory/4768-2-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmp

    Filesize

    64KB

  • memory/4768-3-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmp

    Filesize

    64KB

  • memory/4768-4-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmp

    Filesize

    64KB

  • memory/4768-5-0x00007FF942080000-0x00007FF9426B7000-memory.dmp

    Filesize

    6.2MB

  • memory/4768-6-0x00007FF91BD80000-0x00007FF91BD90000-memory.dmp

    Filesize

    64KB