Resubmissions

09-12-2021 18:02

211209-wmyz3aeefp 10

09-12-2021 13:52

211209-q6fpyadeck 10

18-10-2021 09:36

211018-lkztgaecbm 10

04-10-2021 17:53

211004-wgpjfaggb4 10

Analysis

  • max time kernel
    535s
  • max time network
    483s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    18-10-2021 09:36

General

  • Target

    Invoice-5959498320211004.xlsb

  • Size

    132KB

  • MD5

    887bc475305003bdc34e671a2f3bd080

  • SHA1

    7625f787be7479bf54addeff0ce7107cf0f59f23

  • SHA256

    7e0b4b26bafd471703fac1db25b24936230aecad95732e66420184d717a111ee

  • SHA512

    efb52e8c1fdf6e7cbc80b951220e25c78be0aad5c24b732696784b9b4d5d2c7a284df11fb0f524f64fa3f39a887069599c91f5233062d2aa8c01617104dd9ccd

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-5959498320211004.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1684
  • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
    "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1456

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1456-272-0x000001BFD0780000-0x000001BFD0782000-memory.dmp

    Filesize

    8KB

  • memory/1456-273-0x000001BFD0783000-0x000001BFD0785000-memory.dmp

    Filesize

    8KB

  • memory/1456-315-0x000001BFD0786000-0x000001BFD0788000-memory.dmp

    Filesize

    8KB

  • memory/1684-115-0x00007FFEE1440000-0x00007FFEE1450000-memory.dmp

    Filesize

    64KB

  • memory/1684-116-0x00007FFEE1440000-0x00007FFEE1450000-memory.dmp

    Filesize

    64KB

  • memory/1684-117-0x00007FFEE1440000-0x00007FFEE1450000-memory.dmp

    Filesize

    64KB

  • memory/1684-118-0x00007FFEE1440000-0x00007FFEE1450000-memory.dmp

    Filesize

    64KB

  • memory/1684-119-0x000002C474AF0000-0x000002C474AF2000-memory.dmp

    Filesize

    8KB

  • memory/1684-120-0x000002C474AF0000-0x000002C474AF2000-memory.dmp

    Filesize

    8KB

  • memory/1684-121-0x00007FFEE1440000-0x00007FFEE1450000-memory.dmp

    Filesize

    64KB

  • memory/1684-122-0x000002C474AF0000-0x000002C474AF2000-memory.dmp

    Filesize

    8KB