Analysis
-
max time kernel
141s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 08:09
Behavioral task
behavioral1
Sample
d41092a8d5a00957e4a5f5c33322a079b8092ce62c372ea5743c9b035e2e1386.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d41092a8d5a00957e4a5f5c33322a079b8092ce62c372ea5743c9b035e2e1386.xls
Resource
win10v2004-20220812-en
General
-
Target
d41092a8d5a00957e4a5f5c33322a079b8092ce62c372ea5743c9b035e2e1386.xls
-
Size
87KB
-
MD5
2467ef25529dccaec9c196e1f8124f7d
-
SHA1
9a686190a1d3f1ef347ac5c66a43ef3a8bd94614
-
SHA256
d41092a8d5a00957e4a5f5c33322a079b8092ce62c372ea5743c9b035e2e1386
-
SHA512
1f8aab6b1435c311d8db19576b1f2248fa003c52ad87e4b4f8d307961b10fe181a6c65b8bf118bb8dc6c2f9abd884af18908469c413ed422fa53d0ab18acf447
-
SSDEEP
1536:FIljUj4HMlJS2jcc0lbxOvTgZZ4cY7nJdFoOGIWWt2XeouG6:SHt2jcc0lbxOrDpEOZG6
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.execmd.execmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 928 2484 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3604 2484 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4776 2484 cmd.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2484 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE 2484 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 2484 wrote to memory of 928 2484 EXCEL.EXE cmd.exe PID 2484 wrote to memory of 928 2484 EXCEL.EXE cmd.exe PID 2484 wrote to memory of 3604 2484 EXCEL.EXE cmd.exe PID 2484 wrote to memory of 3604 2484 EXCEL.EXE cmd.exe PID 2484 wrote to memory of 4776 2484 EXCEL.EXE cmd.exe PID 2484 wrote to memory of 4776 2484 EXCEL.EXE cmd.exe PID 928 wrote to memory of 4756 928 cmd.exe attrib.exe PID 928 wrote to memory of 4756 928 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\d41092a8d5a00957e4a5f5c33322a079b8092ce62c372ea5743c9b035e2e1386.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/928-139-0x0000000000000000-mapping.dmp
-
memory/2484-144-0x000001A2B5B48000-0x000001A2B5B4A000-memory.dmpFilesize
8KB
-
memory/2484-143-0x000001A2B5B48000-0x000001A2B5B4A000-memory.dmpFilesize
8KB
-
memory/2484-135-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-136-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-149-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-138-0x00007FFF14B60000-0x00007FFF14B70000-memory.dmpFilesize
64KB
-
memory/2484-134-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-133-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-137-0x00007FFF14B60000-0x00007FFF14B70000-memory.dmpFilesize
64KB
-
memory/2484-148-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-147-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-132-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/2484-146-0x00007FFF16E70000-0x00007FFF16E80000-memory.dmpFilesize
64KB
-
memory/3604-140-0x0000000000000000-mapping.dmp
-
memory/4756-142-0x0000000000000000-mapping.dmp
-
memory/4776-141-0x0000000000000000-mapping.dmp