Analysis

  • max time kernel
    206s
  • max time network
    238s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    25-06-2022 10:00

General

  • Target

    032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201.xls

  • Size

    282KB

  • MD5

    7d753d90d322ad0765eccf1a5d3e1474

  • SHA1

    3853242b62e76f74c3187132411b2af4964aaa87

  • SHA256

    032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201

  • SHA512

    b4c0df830de06c3f7d47212adccf7188fa77f87fda84ea0d786d9e2299922af96fc3f8ebe353a67b6c515e361f4ba026e8a191eb00e0c6508673063d8dbca9b7

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Loads dropped DLL 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 18 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201.xls"
    1⤵
    • Loads dropped DLL
    • Checks processor information in registry
    • Enumerates system info in registry
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3860
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
        PID:3800
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3860 -s 5400
        2⤵
        • Process spawned unexpected child process
        • Program crash
        PID:1420
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 408 -p 3860 -ip 3860
      1⤵
        PID:1668

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\masterbox2.dll

        Filesize

        64KB

        MD5

        5467e81b6c5417af0dcc566605b13481

        SHA1

        eeecc25656f290630dcfe30218cdb69bb0f316aa

        SHA256

        257bee57c5cac49ce0b5f9b160a3aaafde703ecc036cf4cf32975fc08c7f445e

        SHA512

        baf888cd4fcd929b973fedbb791d5e1e320fd4fff0aa15372fa94a0d898e9942ac80bf8965caa5dc8565077ee9928aa6fa3997d7ab114914a08bd863a8789c48

      • memory/3860-133-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmp

        Filesize

        64KB

      • memory/3860-130-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmp

        Filesize

        64KB

      • memory/3860-134-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmp

        Filesize

        64KB

      • memory/3860-135-0x00007FFF75DE0000-0x00007FFF75DF0000-memory.dmp

        Filesize

        64KB

      • memory/3860-136-0x00007FFF75DE0000-0x00007FFF75DF0000-memory.dmp

        Filesize

        64KB

      • memory/3860-137-0x0000020A98220000-0x0000020A98224000-memory.dmp

        Filesize

        16KB

      • memory/3860-138-0x0000020A94ADF000-0x0000020A94AE1000-memory.dmp

        Filesize

        8KB

      • memory/3860-132-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmp

        Filesize

        64KB

      • memory/3860-131-0x00007FFF77E70000-0x00007FFF77E80000-memory.dmp

        Filesize

        64KB

      • memory/3860-141-0x000000005B900000-0x000000005B91E000-memory.dmp

        Filesize

        120KB

      • memory/3860-142-0x0000020A9A290000-0x0000020A9A293000-memory.dmp

        Filesize

        12KB