Analysis

  • max time kernel
    165s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    22-02-2022 08:08

General

  • Target

    Factura 0000000065.xll

  • Size

    638KB

  • MD5

    a673f1b64b97384cdb86e148a94188e8

  • SHA1

    2f924ea70a3a8c7b3c5808af437cb895f90f588a

  • SHA256

    4a9683f3b6658f4895cd3d44c4920d77db5dfd410cf0dc188e4f4d2740c24539

  • SHA512

    0eaaf0d09a828b7289e75e3c92bfb70b5a168031b7670f6eb6c74a0104b448b58f9bb30a09295141e23d0ea60b4571d9f0b220b4e61c38fd81197fc31e254002

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 49 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Factura 0000000065.xll"
    1⤵
      PID:632
    • C:\Windows\system32\MusNotifyIcon.exe
      %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
      1⤵
      • Checks processor information in registry
      PID:3004
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k NetworkService -p
      1⤵
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      PID:3532

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/632-130-0x00007FFB9E8B0000-0x00007FFB9E8C0000-memory.dmp
      Filesize

      64KB

    • memory/632-131-0x00007FFB9E8B0000-0x00007FFB9E8C0000-memory.dmp
      Filesize

      64KB

    • memory/632-132-0x00007FFB9E8B0000-0x00007FFB9E8C0000-memory.dmp
      Filesize

      64KB

    • memory/632-133-0x00007FFB9E8B0000-0x00007FFB9E8C0000-memory.dmp
      Filesize

      64KB

    • memory/632-135-0x00007FFBDE8D0000-0x00007FFBDE8D1000-memory.dmp
      Filesize

      4KB

    • memory/632-134-0x00007FFBDE8CD000-0x00007FFBDE8CE000-memory.dmp
      Filesize

      4KB

    • memory/632-136-0x00007FFB9E8B0000-0x00007FFB9E8C0000-memory.dmp
      Filesize

      64KB