Analysis
-
max time kernel
99s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2022 13:52
Behavioral task
behavioral1
Sample
dbaf68e53f1b4437277935031a33a4c6c8b6456c52c0379f992a906a9256c499.xls
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
dbaf68e53f1b4437277935031a33a4c6c8b6456c52c0379f992a906a9256c499.xls
Resource
win10v2004-20220721-en
General
-
Target
dbaf68e53f1b4437277935031a33a4c6c8b6456c52c0379f992a906a9256c499.xls
-
Size
1.4MB
-
MD5
5131f418189ede0e8ebff6bf4395b2a3
-
SHA1
e32b7e32784c82a6dc0cbf865251730ba6e4bdd6
-
SHA256
dbaf68e53f1b4437277935031a33a4c6c8b6456c52c0379f992a906a9256c499
-
SHA512
7718cafff0b056f4617abc97f0a9273cfb251911a3c1fe3694339759655a7e2f0b4cce7f7e4fc1a33e474ba4b63d623981d0295c8bb5d80da02b14447ac277a9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WindowsSecurity.exepid process 3504 WindowsSecurity.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2060 3504 WerFault.exe WindowsSecurity.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4616 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
WindowsSecurity.exepid process 3504 WindowsSecurity.exe 3504 WindowsSecurity.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
EXCEL.EXEpid process 4616 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
EXCEL.EXEpid process 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE 4616 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
EXCEL.EXEWindowsSecurity.execmd.exedescription pid process target process PID 4616 wrote to memory of 3504 4616 EXCEL.EXE WindowsSecurity.exe PID 4616 wrote to memory of 3504 4616 EXCEL.EXE WindowsSecurity.exe PID 4616 wrote to memory of 3504 4616 EXCEL.EXE WindowsSecurity.exe PID 3504 wrote to memory of 2384 3504 WindowsSecurity.exe cmd.exe PID 3504 wrote to memory of 2384 3504 WindowsSecurity.exe cmd.exe PID 3504 wrote to memory of 2384 3504 WindowsSecurity.exe cmd.exe PID 2384 wrote to memory of 3732 2384 cmd.exe schtasks.exe PID 2384 wrote to memory of 3732 2384 cmd.exe schtasks.exe PID 2384 wrote to memory of 3732 2384 cmd.exe schtasks.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dbaf68e53f1b4437277935031a33a4c6c8b6456c52c0379f992a906a9256c499.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exeC:\Users\Admin\AppData\Roaming\WindowsSecurity.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /sc daily /tn WindowsSecurityPatch /tr C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe /st 11:00 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /tn WindowsSecurityPatch /tr C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe /st 11:00 /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3504 -s 8603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3504 -ip 35041⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exeFilesize
659KB
MD504f7ee1aa5e29d2f2d4ea6b539d20709
SHA1f72d2f06ee7aeaa9180e9ba3132192332dcc1bf8
SHA256e9d550d9a18dd0efee23eb189ba79917d39e5c33fc1dfac662248868c260f073
SHA512d317a7a15165ebb5f04d2a77cb26359afda8a53e3a998c79fc31984581d3fde676b8c017fe80d59a1592ede7e000a48b9733c193bd0d35546ac35cb5346c81c8
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exeFilesize
659KB
MD504f7ee1aa5e29d2f2d4ea6b539d20709
SHA1f72d2f06ee7aeaa9180e9ba3132192332dcc1bf8
SHA256e9d550d9a18dd0efee23eb189ba79917d39e5c33fc1dfac662248868c260f073
SHA512d317a7a15165ebb5f04d2a77cb26359afda8a53e3a998c79fc31984581d3fde676b8c017fe80d59a1592ede7e000a48b9733c193bd0d35546ac35cb5346c81c8
-
memory/2384-141-0x0000000000000000-mapping.dmp
-
memory/3504-138-0x0000000000000000-mapping.dmp
-
memory/3732-142-0x0000000000000000-mapping.dmp
-
memory/4616-135-0x00007FF978CB0000-0x00007FF978CC0000-memory.dmpFilesize
64KB
-
memory/4616-136-0x00007FF978CB0000-0x00007FF978CC0000-memory.dmpFilesize
64KB
-
memory/4616-137-0x000002DC333A0000-0x000002DC333A4000-memory.dmpFilesize
16KB
-
memory/4616-134-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-133-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-132-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-131-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-130-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-144-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-145-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-146-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB
-
memory/4616-147-0x00007FF97B5B0000-0x00007FF97B5C0000-memory.dmpFilesize
64KB