Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2022 13:52
Behavioral task
behavioral1
Sample
f121e8ed0136b54dba3c4cf2dc2a92d82c189d72ae1da1ef8de80014d9bb9676.xls
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f121e8ed0136b54dba3c4cf2dc2a92d82c189d72ae1da1ef8de80014d9bb9676.xls
Resource
win10v2004-20220722-en
General
-
Target
f121e8ed0136b54dba3c4cf2dc2a92d82c189d72ae1da1ef8de80014d9bb9676.xls
-
Size
1.4MB
-
MD5
4cdfb8886da3e667d9e0bd903ad3ebf7
-
SHA1
ddaa200c183abc418bfea5eecc0b20bcd7d15d56
-
SHA256
f121e8ed0136b54dba3c4cf2dc2a92d82c189d72ae1da1ef8de80014d9bb9676
-
SHA512
b3c2d3de21ea23cfd3b6a1332f23fcd77c089388e301c7d5e7b2e115bbccc45ed92589161da3ca29c419f8dc4cd3eb91e9ebbe6b86714a4e5d072f75afb8942e
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
WindowsSecurity.exepid process 3248 WindowsSecurity.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4204 3248 WerFault.exe WindowsSecurity.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4404 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
WindowsSecurity.exepid process 3248 WindowsSecurity.exe 3248 WindowsSecurity.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
EXCEL.EXEpid process 4404 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 10 IoCs
Processes:
EXCEL.EXEpid process 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE 4404 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
EXCEL.EXEWindowsSecurity.execmd.exedescription pid process target process PID 4404 wrote to memory of 3248 4404 EXCEL.EXE WindowsSecurity.exe PID 4404 wrote to memory of 3248 4404 EXCEL.EXE WindowsSecurity.exe PID 4404 wrote to memory of 3248 4404 EXCEL.EXE WindowsSecurity.exe PID 3248 wrote to memory of 3888 3248 WindowsSecurity.exe cmd.exe PID 3248 wrote to memory of 3888 3248 WindowsSecurity.exe cmd.exe PID 3248 wrote to memory of 3888 3248 WindowsSecurity.exe cmd.exe PID 3888 wrote to memory of 4428 3888 cmd.exe schtasks.exe PID 3888 wrote to memory of 4428 3888 cmd.exe schtasks.exe PID 3888 wrote to memory of 4428 3888 cmd.exe schtasks.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\f121e8ed0136b54dba3c4cf2dc2a92d82c189d72ae1da1ef8de80014d9bb9676.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exeC:\Users\Admin\AppData\Roaming\WindowsSecurity.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /sc daily /tn WindowsSecurityPatch /tr C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe /st 11:00 /f3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc daily /tn WindowsSecurityPatch /tr C:\Users\Admin\AppData\Roaming\WindowsSecurity.exe /st 11:00 /f4⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3248 -s 8683⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3248 -ip 32481⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exeFilesize
659KB
MD504f7ee1aa5e29d2f2d4ea6b539d20709
SHA1f72d2f06ee7aeaa9180e9ba3132192332dcc1bf8
SHA256e9d550d9a18dd0efee23eb189ba79917d39e5c33fc1dfac662248868c260f073
SHA512d317a7a15165ebb5f04d2a77cb26359afda8a53e3a998c79fc31984581d3fde676b8c017fe80d59a1592ede7e000a48b9733c193bd0d35546ac35cb5346c81c8
-
C:\Users\Admin\AppData\Roaming\WindowsSecurity.exeFilesize
659KB
MD504f7ee1aa5e29d2f2d4ea6b539d20709
SHA1f72d2f06ee7aeaa9180e9ba3132192332dcc1bf8
SHA256e9d550d9a18dd0efee23eb189ba79917d39e5c33fc1dfac662248868c260f073
SHA512d317a7a15165ebb5f04d2a77cb26359afda8a53e3a998c79fc31984581d3fde676b8c017fe80d59a1592ede7e000a48b9733c193bd0d35546ac35cb5346c81c8
-
memory/3248-140-0x0000000000000000-mapping.dmp
-
memory/3888-143-0x0000000000000000-mapping.dmp
-
memory/4404-136-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-137-0x00007FFF5A990000-0x00007FFF5A9A0000-memory.dmpFilesize
64KB
-
memory/4404-138-0x00007FFF5A990000-0x00007FFF5A9A0000-memory.dmpFilesize
64KB
-
memory/4404-139-0x00000218C5740000-0x00000218C5744000-memory.dmpFilesize
16KB
-
memory/4404-132-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-135-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-134-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-133-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-146-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-147-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-148-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4404-149-0x00007FFF5CC70000-0x00007FFF5CC80000-memory.dmpFilesize
64KB
-
memory/4428-144-0x0000000000000000-mapping.dmp