Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20220722-en -
resource tags
arch:x64arch:x86image:win10v2004-20220722-enlocale:en-usos:windows10-2004-x64system -
submitted
09-08-2022 10:12
Static task
static1
Behavioral task
behavioral1
Sample
sample20220809-01.xls
Resource
win7-20220715-en
General
-
Target
sample20220809-01.xls
-
Size
84KB
-
MD5
5bc2a4eefe16c8465f076bdfc3d38870
-
SHA1
71d800ce5f7cbd5f9d3ba9a16626c592bbc28c46
-
SHA256
89d6b9a0f7d4f30f5021a893925dfbea12051a0d3e5f5845fd1bc45b74eed830
-
SHA512
84b5ead8d2a3be2f86d3b568a1eaf22c425910d5bb7df75e31264aa4c79eb4b8e86f9728b8b7f6400026e782a6114a0626a8bb0f806e44ac688039077b6970c0
Malware Config
Signatures
-
Detects SVCReady loader 1 IoCs
resource yara_rule behavioral2/memory/1312-142-0x0000000010000000-0x0000000010091000-memory.dmp family_svcready -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2152 4880 regsvr32.exe 79 -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
pid Process 1312 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3148 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE 3148 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2152 wrote to memory of 1312 2152 regsvr32.exe 93 PID 2152 wrote to memory of 1312 2152 regsvr32.exe 93 PID 2152 wrote to memory of 1312 2152 regsvr32.exe 93
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\sample20220809-01.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3148
-
C:\Windows\system32\regsvr32.exeregsvr32 /s C:\Users\Admin\Documents\10039.1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\regsvr32.exe/s C:\Users\Admin\Documents\10039.2⤵
- Loads dropped DLL
PID:1312
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD56826bda418d4b39a0defd2c320895bf4
SHA17533cc0767670b14843fb2978a92f11175578b6a
SHA2569ff005f5b6b3302b23ff4b3f08a9dffbb48d5da08a31538197606efca2e4dcd1
SHA5128c58314cc1e2aca736f7ca3017416fb3b6e4230755f5aafb6e554565475f7abe243972dfc021b7c9f0dce46b7a0b385cac07d0ac99d9101e5bf12f5dfe9b18b7
-
Filesize
1.2MB
MD56826bda418d4b39a0defd2c320895bf4
SHA17533cc0767670b14843fb2978a92f11175578b6a
SHA2569ff005f5b6b3302b23ff4b3f08a9dffbb48d5da08a31538197606efca2e4dcd1
SHA5128c58314cc1e2aca736f7ca3017416fb3b6e4230755f5aafb6e554565475f7abe243972dfc021b7c9f0dce46b7a0b385cac07d0ac99d9101e5bf12f5dfe9b18b7