Analysis

  • max time kernel
    108s
  • max time network
    108s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    06-05-2021 22:02

General

  • Target

    Inv_399139_86191.xlsm

  • Size

    26KB

  • MD5

    498adcc5b1c0e59baa8779fb8a1b72df

  • SHA1

    e5c0063a99e22394ce84104ea5d775e48dbd70a4

  • SHA256

    7db855d25c3468c8b0cc6ed349e16f8611a875aa0c8b95b98c4c1845fc503c7b

  • SHA512

    0effc72caeb94dc7475c4371fdaa692676bf24fbcc2f79386e5f05f9012734afa46984d80547a2c1cf61f5b4d5574944d4ac24163b02aa39bf568f6b7a1884f2

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Inv_399139_86191.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1744
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1744 -s 4676
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:752

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1744-114-0x00007FF69D940000-0x00007FF6A0EF6000-memory.dmp
    Filesize

    53.7MB

  • memory/1744-115-0x00007FF824490000-0x00007FF8244A0000-memory.dmp
    Filesize

    64KB

  • memory/1744-116-0x00007FF824490000-0x00007FF8244A0000-memory.dmp
    Filesize

    64KB

  • memory/1744-117-0x00007FF824490000-0x00007FF8244A0000-memory.dmp
    Filesize

    64KB

  • memory/1744-118-0x00007FF824490000-0x00007FF8244A0000-memory.dmp
    Filesize

    64KB

  • memory/1744-121-0x00007FF844C90000-0x00007FF845D7E000-memory.dmp
    Filesize

    16.9MB

  • memory/1744-122-0x00007FF824490000-0x00007FF8244A0000-memory.dmp
    Filesize

    64KB

  • memory/1744-123-0x00007FF842D90000-0x00007FF844C85000-memory.dmp
    Filesize

    31.0MB

  • memory/1744-179-0x000001923D170000-0x000001923D174000-memory.dmp
    Filesize

    16KB