Analysis
-
max time kernel
162s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-05-2022 16:28
Behavioral task
behavioral1
Sample
?i=1juoptlvj.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
?i=1juoptlvj.xls
Resource
win10v2004-20220414-en
General
-
Target
?i=1juoptlvj.xls
-
Size
113KB
-
MD5
3e47f75fb9dbb067e2b47049666fc1d2
-
SHA1
df51ed9b3c9bc6bbef920f2de3bedeccda5217c3
-
SHA256
aa65a34067b0c50e89c1078d0c7ff08de43e5036241404574f846265de6ff6bd
-
SHA512
878839b9037053905384417e505741ef74622804eb384f84d1cd1b8b96eb8b0521d6f248f5a9ae635c2367cab17669db248156ef0ca5f11d6a54f3adc0d118eb
Malware Config
Extracted
http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4692 1288 rundll32.exe 83 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 1288 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid Process 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE 1288 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
EXCEL.EXEdescription pid Process procid_target PID 1288 wrote to memory of 4692 1288 EXCEL.EXE 91 PID 1288 wrote to memory of 4692 1288 EXCEL.EXE 91 PID 1288 wrote to memory of 4692 1288 EXCEL.EXE 91
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\_i=1juoptlvj.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\sun.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r2⤵
- Process spawned unexpected child process
PID:4692
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c3b8b651f46d7c7bcdef25bb6dc2d386
SHA160767aeb96dcaa5ff979dc4fac8673827b0c80fa
SHA256908981b1611586011d764bf82dca61b1f114c807c03a7500b4eedcde42e76f16
SHA5120a32f8710b922226100a03cf41f95296a1c1250146ee28bc33ef692ecc987477fbdb7519927eebd16db7ec73b1b381e3e0511aa6cb20d64fe5d35feb78154090