Analysis
-
max time kernel
120s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
20/10/2022, 13:20
Behavioral task
behavioral1
Sample
6a874b617592c6d3c5b9c530850ee937f32c7cc5e1297b6285b973e3d845de65.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6a874b617592c6d3c5b9c530850ee937f32c7cc5e1297b6285b973e3d845de65.xls
Resource
win10v2004-20220812-en
General
-
Target
6a874b617592c6d3c5b9c530850ee937f32c7cc5e1297b6285b973e3d845de65.xls
-
Size
124KB
-
MD5
709ad57e7e2909440ca0372a78d86ce0
-
SHA1
284d0765a0cff72d3663a3f308ed1caced7fa1ea
-
SHA256
6a874b617592c6d3c5b9c530850ee937f32c7cc5e1297b6285b973e3d845de65
-
SHA512
e82039affb29d9fcff484590b8130aa1ffae9ffdb2807122a16676b116cc8f340458c24546a6bcf923257054bbd6eb535520ef49f1128d4c0723649cc39736d2
-
SSDEEP
1536:OSSSSWCXKy5xNW53brzQ7ITkk62G+f4u7cJtXwj1Mgwoh6wPpc:VM7WJbrzQ7ITkcuugJtXwZMgXc
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1408 860 cmd.exe 26 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 628 860 cmd.exe 26 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1336 860 cmd.exe 26 -
Deletes itself 1 IoCs
pid Process 860 EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3845472200-3839195424-595303356-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\C59D6000\:Zone.Identifier:$DATA EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 860 EXCEL.EXE -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 860 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 860 wrote to memory of 1408 860 EXCEL.EXE 27 PID 860 wrote to memory of 1408 860 EXCEL.EXE 27 PID 860 wrote to memory of 1408 860 EXCEL.EXE 27 PID 860 wrote to memory of 1408 860 EXCEL.EXE 27 PID 860 wrote to memory of 628 860 EXCEL.EXE 28 PID 860 wrote to memory of 628 860 EXCEL.EXE 28 PID 860 wrote to memory of 628 860 EXCEL.EXE 28 PID 860 wrote to memory of 628 860 EXCEL.EXE 28 PID 860 wrote to memory of 1336 860 EXCEL.EXE 32 PID 860 wrote to memory of 1336 860 EXCEL.EXE 32 PID 860 wrote to memory of 1336 860 EXCEL.EXE 32 PID 860 wrote to memory of 1336 860 EXCEL.EXE 32 PID 1408 wrote to memory of 844 1408 cmd.exe 31 PID 1408 wrote to memory of 844 1408 cmd.exe 31 PID 1408 wrote to memory of 844 1408 cmd.exe 31 PID 1408 wrote to memory of 844 1408 cmd.exe 31 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 844 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\6a874b617592c6d3c5b9c530850ee937f32c7cc5e1297b6285b973e3d845de65.xls1⤵
- Deletes itself
- Enumerates system info in registry
- Modifies Internet Explorer settings
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:844
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:628
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1336
-