Analysis

  • max time kernel
    105s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    15-09-2021 06:13

General

  • Target

    INVOICE = 212888585 .xlsx

  • Size

    732KB

  • MD5

    145e00853b80fb2d97676c4416f984a9

  • SHA1

    fa80c59ebbafc435e88ffdceae00450b56ec5d48

  • SHA256

    e9c342550d334bffc58a310997673e24eed03f4d2b9c441dec943b24e7d29d08

  • SHA512

    6e150bd0e392f3bb7696a0f8dcffcc453c508879165e0bef4eec268e0b5aebe40f03b4bb683970e91e4d3b010481c18c81d697f186cb813cb299deb4767d9467

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\INVOICE = 212888585 .xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2280
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:2776

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2280-123-0x00007FFDAC070000-0x00007FFDAD15E000-memory.dmp
      Filesize

      16.9MB

    • memory/2280-116-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-117-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-118-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-119-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-122-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-115-0x00007FF662600000-0x00007FF665BB6000-memory.dmp
      Filesize

      53.7MB

    • memory/2280-124-0x00007FFDAA170000-0x00007FFDAC065000-memory.dmp
      Filesize

      31.0MB

    • memory/2280-289-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-290-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-291-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2280-292-0x00007FFD89D80000-0x00007FFD89D90000-memory.dmp
      Filesize

      64KB

    • memory/2776-203-0x0000000000000000-mapping.dmp