Analysis
-
max time kernel
206s -
max time network
238s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 10:00
Static task
static1
Behavioral task
behavioral1
Sample
032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201.xls
Resource
win10v2004-20220414-en
General
-
Target
032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201.xls
-
Size
282KB
-
MD5
7d753d90d322ad0765eccf1a5d3e1474
-
SHA1
3853242b62e76f74c3187132411b2af4964aaa87
-
SHA256
032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201
-
SHA512
b4c0df830de06c3f7d47212adccf7188fa77f87fda84ea0d786d9e2299922af96fc3f8ebe353a67b6c515e361f4ba026e8a191eb00e0c6508673063d8dbca9b7
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1420 3860 WerFault.exe 79 -
Loads dropped DLL 1 IoCs
pid Process 3860 EXCEL.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 1420 3860 WerFault.exe 79 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{D04BA487-749D-4672-A1CD-100BDCA5CB39}\E12BD00A.png:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3860 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3860 EXCEL.EXE 3860 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3860 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 18 IoCs
pid Process 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE 3860 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3860 wrote to memory of 3800 3860 EXCEL.EXE 87 PID 3860 wrote to memory of 3800 3860 EXCEL.EXE 87
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\032a39900761efd9adff97b6aef768d65152328c9e6fb7b6794b8aa047049201.xls"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3800
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3860 -s 54002⤵
- Process spawned unexpected child process
- Program crash
PID:1420
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 408 -p 3860 -ip 38601⤵PID:1668
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD55467e81b6c5417af0dcc566605b13481
SHA1eeecc25656f290630dcfe30218cdb69bb0f316aa
SHA256257bee57c5cac49ce0b5f9b160a3aaafde703ecc036cf4cf32975fc08c7f445e
SHA512baf888cd4fcd929b973fedbb791d5e1e320fd4fff0aa15372fa94a0d898e9942ac80bf8965caa5dc8565077ee9928aa6fa3997d7ab114914a08bd863a8789c48