Analysis

  • max time kernel
    107s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    28-07-2021 02:26

General

  • Target

    Invoice_015275.xlsm

  • Size

    89KB

  • MD5

    998a996a2371923b05250adc50f2c88c

  • SHA1

    5dcff5955a7d6f0d5cb09074663feda9e8b6fe83

  • SHA256

    c9843b6e4015374ff8049d9f0fed174a1aa690d7da3cb459922eae885006184a

  • SHA512

    c627d06392672cb56f0e06f98f00f4918897b083a765da36f6869d466a6eedead1ffcc328965955346667768fdab6aeb8cf166539daf3036a53c5e6c75275259

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 16 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice_015275.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:996
    • C:\Windows\SYSTEM32\mshta.exe
      mshta C:\ProgramData//theDialogOptionsCalculation.sct
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3892
      • C:\Windows\SYSTEM32\rundll32.exe
        rundll32.exe C:\ProgramData\qScrollBar.dll,AddLookaside
        3⤵
          PID:2260

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\theDialogOptionsCalculation.sct
      MD5

      8206451e9ae57b8d68dfaa221be4ac68

      SHA1

      6518d1f303dffc52a9f940b211b7300eb33f0178

      SHA256

      f03e8b823b0ee4420a82ee7e9594cddc3ffb38f04685846498a57808ab167d78

      SHA512

      722e105e5545de54b3db97f9421933674bd20fbadde220fde126e046d0a571ed0db1fbb084cb5f790d9a889dcdfcfbab275bf5be6a5070a95eec935b2900915a

    • memory/996-117-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-305-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-114-0x00007FF71C6A0000-0x00007FF71FC56000-memory.dmp
      Filesize

      53.7MB

    • memory/996-118-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-119-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-122-0x00007FF882260000-0x00007FF88334E000-memory.dmp
      Filesize

      16.9MB

    • memory/996-123-0x000001CEE4170000-0x000001CEE6065000-memory.dmp
      Filesize

      31.0MB

    • memory/996-308-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-115-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-307-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-116-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/996-306-0x00007FF861870000-0x00007FF861880000-memory.dmp
      Filesize

      64KB

    • memory/2260-284-0x0000000000000000-mapping.dmp
    • memory/3892-280-0x0000000000000000-mapping.dmp