Analysis
-
max time kernel
182s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-06-2022 09:59
Static task
static1
Behavioral task
behavioral1
Sample
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls
Resource
win10v2004-20220414-en
General
-
Target
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls
-
Size
937KB
-
MD5
0fea640a7da27f365b3675f73626b9c9
-
SHA1
fd4825f244e9c145486cb6930ad05695b9972668
-
SHA256
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c
-
SHA512
c9a10288762f3f5a3fdff17f8dd8560e7a884f1b83f405c2e85c6c86e42f69a30841c13aa0f2ecfc55aed42995d7aeb8fe40415e423ed0a306d2e7d00883dfbf
Malware Config
Extracted
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Loads dropped DLL 1 IoCs
pid Process 2984 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{9A63F43F-0137-4831-A5F8-3A844A7022B2}\318A50C9.tmp:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2984 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2984 EXCEL.EXE 2984 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2984 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 25 IoCs
pid Process 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE 2984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2984 wrote to memory of 3924 2984 EXCEL.EXE 85 PID 2984 wrote to memory of 3924 2984 EXCEL.EXE 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c.xls"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:3924
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
234KB
MD54224c05eb24238e24a124eecee907cec
SHA1551979d132b3e45aaab7ea8e18441b303f49a74a
SHA2566d5c207c998990f1e7c527971dfe0eb6d2b21fca136d616e6e211019d1c77698
SHA512ef4b9f06fcdd091ac818974cd777a6fdf5cd88a70f8f5fad33173ae70905b8487d60acb4af2ddb6c73d2789085f28ec1134e5efdc6a9659b0417d8fa350e7638