Analysis
-
max time kernel
30s -
max time network
33s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
10-04-2022 07:53
Static task
static1
Behavioral task
behavioral1
Sample
William Smith Resume.xls
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
William Smith Resume.xls
Resource
win10v2004-20220331-en
General
-
Target
William Smith Resume.xls
-
Size
163KB
-
MD5
0a054818926d97f4100774255a908dba
-
SHA1
de572eddd30b34d1e328c8d5fb986cc1e04c82e8
-
SHA256
0fba1f02cd2872efc4cdc6806bc49d786005f590971ee31f97ce71c1ccf87fe2
-
SHA512
21659d1132eef51aaf43f7c3dffde06e7018e7d9847c7a7106eb9aee2747f9c6a967a80ab052db17903b0ac9cb63ee3c8371725f4206decff13dbbe996bcf3f1
Malware Config
Extracted
http://march262020.com/files/april8.dll
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4536 1708 rundll32.exe 62 -
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
suricata: ET MALWARE Possible Compromised Host AnubisNetworks Sinkhole Cookie Value Snkz
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1708 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE 1708 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1708 wrote to memory of 4536 1708 EXCEL.EXE 84 PID 1708 wrote to memory of 4536 1708 EXCEL.EXE 84
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\William Smith Resume.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\ProgramData\ieTneVi.dll,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:4536
-