Analysis

  • max time kernel
    121s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    03-11-2021 08:50

General

  • Target

    RIOSAT_DOC.xlsx

  • Size

    201KB

  • MD5

    4ed0940e6e53d246dae50a1a7dda5f68

  • SHA1

    4439f0cdb3937226cb4015ec4c2df54a36c29f65

  • SHA256

    e6b973beff845a214101c3f4714d32f15112b86a9fbfbd301914063f2e4e5677

  • SHA512

    7f7734d8f9983339f279e95b76ce78743875889e5a1e7951f80e9e984ac34b31312ee0f80682976895e030d0784ec17be5b0ec65536a86b448706979a0f288f9

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\RIOSAT_DOC.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2132

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2132-115-0x00007FF8E37B0000-0x00007FF8E37C0000-memory.dmp
    Filesize

    64KB

  • memory/2132-116-0x00007FF8E37B0000-0x00007FF8E37C0000-memory.dmp
    Filesize

    64KB

  • memory/2132-117-0x00007FF8E37B0000-0x00007FF8E37C0000-memory.dmp
    Filesize

    64KB

  • memory/2132-118-0x00007FF8E37B0000-0x00007FF8E37C0000-memory.dmp
    Filesize

    64KB

  • memory/2132-119-0x00007FF8E37B0000-0x00007FF8E37C0000-memory.dmp
    Filesize

    64KB

  • memory/2132-121-0x000001FA409E0000-0x000001FA409E2000-memory.dmp
    Filesize

    8KB

  • memory/2132-120-0x000001FA409E0000-0x000001FA409E2000-memory.dmp
    Filesize

    8KB

  • memory/2132-122-0x000001FA409E0000-0x000001FA409E2000-memory.dmp
    Filesize

    8KB