Analysis

  • max time kernel
    111s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    20-01-2022 19:31

General

  • Target

    PAYMENT INVOICE.xlsx

  • Size

    95KB

  • MD5

    4891415ab0895f94954e864fbb22fdd0

  • SHA1

    7fca6e7716ad0460124fe10904cae6ec81332a67

  • SHA256

    7d1b0018f19ea705eca5d476f4d2aa2cb8899b269b99df63185aa8a3faa1b9f1

  • SHA512

    953ea3728ded97668c28864338c1db65faa77a679a317433bab5e560d1d1e382d01d51e9b82aae15a453df44118f975daf8ce53f64c02b30af4b8c21924c8386

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PAYMENT INVOICE.xlsx"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:576
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p
    1⤵
      PID:3524
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 9ecf3d41f05d47f5c999dabc60321877 OCc6KrGzrkeGdk/2fP5osg.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:1980
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k wusvcs -p
      1⤵
        PID:1888

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/576-130-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-132-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-131-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-133-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-134-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-137-0x00007FFCC1470000-0x00007FFCC1480000-memory.dmp
        Filesize

        64KB

      • memory/576-138-0x00007FFCC1470000-0x00007FFCC1480000-memory.dmp
        Filesize

        64KB

      • memory/576-179-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-180-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-181-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB

      • memory/576-182-0x00007FFCC37B0000-0x00007FFCC37C0000-memory.dmp
        Filesize

        64KB