Analysis

  • max time kernel
    156s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    04-02-2022 13:21

General

  • Target

    emo99.xls

  • Size

    142KB

  • MD5

    151a3a0128124613ed535a0c94fef154

  • SHA1

    202916a33701b5db729211b462a6abb94f98c1fa

  • SHA256

    8ddd5a2055cae9fa9e49ac6f4827d99d40d0ca74e880f521bc33079fb0d9405c

  • SHA512

    0732461d273e576a817cd220f1e0e1830e9bf02434142a66fb7093ca9bf29f35123db59e571aad7e3d49bec67d021300955849c6224b57e958dc97f6dcf34335

Score
8/10

Malware Config

Signatures

  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\emo99.xls"
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1888
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:4008
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe ffae1519cb7e4317121e46d168cbf797 NLVZI12Q3kScGIpd+L3auw.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:432
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:1252

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1888-130-0x00007FFDE7F90000-0x00007FFDE7FA0000-memory.dmp

    Filesize

    64KB

  • memory/1888-132-0x00007FFDE7F90000-0x00007FFDE7FA0000-memory.dmp

    Filesize

    64KB

  • memory/1888-131-0x00007FFDE7F90000-0x00007FFDE7FA0000-memory.dmp

    Filesize

    64KB

  • memory/1888-133-0x00007FFDE7F90000-0x00007FFDE7FA0000-memory.dmp

    Filesize

    64KB

  • memory/1888-134-0x00007FFDE7F90000-0x00007FFDE7FA0000-memory.dmp

    Filesize

    64KB

  • memory/1888-137-0x00007FFDE58E0000-0x00007FFDE58F0000-memory.dmp

    Filesize

    64KB

  • memory/1888-138-0x00007FFDE58E0000-0x00007FFDE58F0000-memory.dmp

    Filesize

    64KB