Analysis
-
max time kernel
148s -
max time network
161s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
18-05-2021 19:20
Behavioral task
behavioral1
Sample
cancel_sub_JPLyeahyourenotgettingmynumber.xlsb
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
cancel_sub_JPLyeahyourenotgettingmynumber.xlsb
Resource
win10v20210408
windows10_x64
0 signatures
0 seconds
General
-
Target
cancel_sub_JPLyeahyourenotgettingmynumber.xlsb
-
Size
264KB
-
MD5
f1b51acf675dd0973ce3ec78fd9a1859
-
SHA1
83e8858f1d6a849151289a7c507a740d59e5da79
-
SHA256
7c2dae7cfc7b469c26b14d5cf7aed0e063ab8f854c7563d1e7fca448e6827a05
-
SHA512
9ce754214b348348fbdbdc933a61c9f01646f8021769c1c683fe1eb7d5af59e22950226233244cd7f304944164b46a55d708a668e01cf115085466357b766b43
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3588 644 cmd.exe 67 -
Loads dropped DLL 1 IoCs
pid Process 1252 rundll32.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1264 1252 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 644 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe 1264 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1264 WerFault.exe Token: SeBackupPrivilege 1264 WerFault.exe Token: SeDebugPrivilege 1264 WerFault.exe -
Suspicious use of SetWindowsHookEx 19 IoCs
pid Process 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE 644 EXCEL.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 644 wrote to memory of 2368 644 EXCEL.EXE 77 PID 644 wrote to memory of 2368 644 EXCEL.EXE 77 PID 644 wrote to memory of 3588 644 EXCEL.EXE 81 PID 644 wrote to memory of 3588 644 EXCEL.EXE 81 PID 3588 wrote to memory of 1940 3588 cmd.exe 83 PID 3588 wrote to memory of 1940 3588 cmd.exe 83 PID 3588 wrote to memory of 3460 3588 cmd.exe 84 PID 3588 wrote to memory of 3460 3588 cmd.exe 84 PID 3460 wrote to memory of 1252 3460 rundll32.exe 85 PID 3460 wrote to memory of 1252 3460 rundll32.exe 85 PID 3460 wrote to memory of 1252 3460 rundll32.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\cancel_sub_JPLyeahyourenotgettingmynumber.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:644 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2368
-
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c certutil -decode C:\Users\Public\4802545.xs1 C:\Users\Public\4802545.xs2 && rundll32 C:\Users\Public\4802545.xs2,DF12⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\system32\certutil.execertutil -decode C:\Users\Public\4802545.xs1 C:\Users\Public\4802545.xs23⤵PID:1940
-
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Public\4802545.xs2,DF13⤵
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\4802545.xs2,DF14⤵
- Loads dropped DLL
PID:1252 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 8205⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1264
-
-
-
-