Analysis

  • max time kernel
    150s
  • max time network
    117s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    13-05-2021 12:54

General

  • Target

    catalog-2005820118.xls

  • Size

    367KB

  • MD5

    29705062863dfd8816d9ea578aab78fd

  • SHA1

    40c270973f51fbba0b4bf1b54b0fe2a5512d2954

  • SHA256

    447579b3f72198ff1cdb35da46c870a10997f4719d7f92bc943cad5018abc5c8

  • SHA512

    9cc415d854b445782da55d18080e8d21e06ae9d74236bfe1993b0417a9fb7eac9d3fa7e1add44dbec3ecb4e76b96df6188f11857d94b826fde9b138b2212c92c

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\catalog-2005820118.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:808
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\tuti.rut,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:540
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\tuti.rut1,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:3180

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/540-179-0x0000000000000000-mapping.dmp
  • memory/808-114-0x00007FF6EC200000-0x00007FF6EF7B6000-memory.dmp
    Filesize

    53.7MB

  • memory/808-115-0x00007FF999990000-0x00007FF9999A0000-memory.dmp
    Filesize

    64KB

  • memory/808-116-0x00007FF999990000-0x00007FF9999A0000-memory.dmp
    Filesize

    64KB

  • memory/808-117-0x00007FF999990000-0x00007FF9999A0000-memory.dmp
    Filesize

    64KB

  • memory/808-118-0x00007FF999990000-0x00007FF9999A0000-memory.dmp
    Filesize

    64KB

  • memory/808-121-0x00007FF9BA4C0000-0x00007FF9BB5AE000-memory.dmp
    Filesize

    16.9MB

  • memory/808-122-0x00007FF999990000-0x00007FF9999A0000-memory.dmp
    Filesize

    64KB

  • memory/808-123-0x00007FF9B85C0000-0x00007FF9BA4B5000-memory.dmp
    Filesize

    31.0MB

  • memory/3180-180-0x0000000000000000-mapping.dmp