Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
15-05-2021 06:01
Behavioral task
behavioral1
Sample
test.xlsb
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
test.xlsb
-
Size
254KB
-
MD5
dc37192b5c4c8c4f94c73c18ce5e3829
-
SHA1
0aa6bb11a11dade2269d90b2781ed0a517362012
-
SHA256
db53f42e13d2685bd34dbc5c79fad637c9344e72e210ca05504420874e98c2a6
-
SHA512
3e8b179d8521fb33a46eeeca74bbda7a4e8a32f47b6195b17d62664dd2e31716261a61a495857ed08dbbc001a9eab8adec7133921179eb3df66c53e18c586d9a
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3708 3152 cmd.exe 68 -
Nloader Payload 1 IoCs
resource yara_rule behavioral2/memory/3888-186-0x00000000049F0000-0x00000000049F6000-memory.dmp nloader -
Loads dropped DLL 1 IoCs
pid Process 3888 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1676 3888 WerFault.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3152 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe 1676 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1676 WerFault.exe Token: SeBackupPrivilege 1676 WerFault.exe Token: SeDebugPrivilege 1676 WerFault.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE 3152 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3152 wrote to memory of 3708 3152 EXCEL.EXE 80 PID 3152 wrote to memory of 3708 3152 EXCEL.EXE 80 PID 3708 wrote to memory of 1116 3708 cmd.exe 81 PID 3708 wrote to memory of 1116 3708 cmd.exe 81 PID 3708 wrote to memory of 3900 3708 cmd.exe 82 PID 3708 wrote to memory of 3900 3708 cmd.exe 82 PID 3900 wrote to memory of 3888 3900 rundll32.exe 83 PID 3900 wrote to memory of 3888 3900 rundll32.exe 83 PID 3900 wrote to memory of 3888 3900 rundll32.exe 83
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\test.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c certutil -decode %PUBLIC%\130486.dot %PUBLIC%\130486.pgj && rundll32 %PUBLIC%\130486.pgj,DF12⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\system32\certutil.execertutil -decode C:\Users\Public\130486.dot C:\Users\Public\130486.pgj3⤵PID:1116
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Public\130486.pgj,DF13⤵
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\130486.pgj,DF14⤵
- Loads dropped DLL
PID:3888 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3888 -s 8805⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
-
-