Analysis
-
max time kernel
163s -
max time network
188s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 04:42
Behavioral task
behavioral1
Sample
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls
Resource
win10v2004-20220721-en
General
-
Target
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls
-
Size
681KB
-
MD5
97538afcdbded79ba720361d76574cec
-
SHA1
18602da6c649eac84c93706422c0919b8d035820
-
SHA256
b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c
-
SHA512
a3634a471078b92eb55564717c7846f8e6d51a4e968865717a785385bfe8513a8fc9cecc517df4b52cc4a6d1d04f2f5972d98c5e86a41a4aba738ecef0104d3d
Malware Config
Extracted
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Loads dropped DLL 1 IoCs
pid Process 3924 EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{DFD9454A-BC6B-468D-92FC-3C6DA08FAEDC}\4DCB66F5.tmp:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3924 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3924 EXCEL.EXE 3924 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3924 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE 3924 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3924 wrote to memory of 5112 3924 EXCEL.EXE 92 PID 3924 wrote to memory of 5112 3924 EXCEL.EXE 92
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b49a9a0267c16f727751d36b6ce7444550a101683a872195812348757fed7d8c.xls"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:5112
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
229KB
MD522228b7db5b4ef6b31f68ae139f7f3ae
SHA121d2f871fd396aa0ed6f8e947139a3cb0787dc1b
SHA2561746e560497a8adbd729ca4139082d78e0fc78020e10d1699ca63726ae2ebc22
SHA512f32f061b1cda1646860c0fa22c0a8a1b0ae839dc4971b449afb910ecf08e709ba5f1ee6cb3716d6842f56e8956f845203d74c3618a7c7cd13c2ab7e84efa5d65