Analysis

  • max time kernel
    77s
  • max time network
    139s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-12-2021 01:03

General

  • Target

    Results12232021.xls

  • Size

    649KB

  • MD5

    9743defc7fa9a3c68e74e9ef3ce64d76

  • SHA1

    5e2c9a057ff559e623ed2746ef4f76695af96a20

  • SHA256

    df7a99e770202105350874b211c5842acbc6bf7d83b43d0f4f288172890e40cd

  • SHA512

    c2495831bd5ff5d2e147478d642e1851e038c71b0abcaf8eb0d0f6869ac6e811700a3dc340bb852562e14911602564b587378e492ad786b14409ecb7ea4e2ab9

Score
6/10

Malware Config

Signatures

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Results12232021.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 2448
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 2448
        3⤵
          PID:1372

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1372-271-0x0000000000000000-mapping.dmp
    • memory/2216-266-0x0000000000000000-mapping.dmp
    • memory/2996-115-0x00007FF9FB330000-0x00007FF9FB340000-memory.dmp
      Filesize

      64KB

    • memory/2996-116-0x00007FF9FB330000-0x00007FF9FB340000-memory.dmp
      Filesize

      64KB

    • memory/2996-117-0x00007FF9FB330000-0x00007FF9FB340000-memory.dmp
      Filesize

      64KB

    • memory/2996-118-0x00007FF9FB330000-0x00007FF9FB340000-memory.dmp
      Filesize

      64KB

    • memory/2996-120-0x0000023475650000-0x0000023475652000-memory.dmp
      Filesize

      8KB

    • memory/2996-119-0x0000023475650000-0x0000023475652000-memory.dmp
      Filesize

      8KB

    • memory/2996-121-0x00007FF9FB330000-0x00007FF9FB340000-memory.dmp
      Filesize

      64KB

    • memory/2996-122-0x0000023475650000-0x0000023475652000-memory.dmp
      Filesize

      8KB