Analysis

  • max time kernel
    191s
  • max time network
    212s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-11-2022 21:30

General

  • Target

    97d161c2b7539d40f13d0e719ac219b6ecb645f2c5872d0a2f2a0837ecee4116.xls

  • Size

    318KB

  • MD5

    8ad880d25f705148baefa205b906b363

  • SHA1

    23cc2ae12ee4499a5b562a28017807bdf5168d0d

  • SHA256

    97d161c2b7539d40f13d0e719ac219b6ecb645f2c5872d0a2f2a0837ecee4116

  • SHA512

    eff42190a51a6c02b778e7b0754e8b142c2265782f1cddb0da3490ca12af0444076aad7136a69cd4766ceb2de5d516feb7e55e110640ca28ecf953cdb41af0fa

  • SSDEEP

    6144:0Nd+FWX9VgJkiOxfwPIBDWZbiNJfnNO1NC:0NjCJ8xfwAB2iNJIC

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\97d161c2b7539d40f13d0e719ac219b6ecb645f2c5872d0a2f2a0837ecee4116.xls"
    1⤵
    • Drops file in System32 directory
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4164
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 4080
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 4080
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2108
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4164 -s 4064
      2⤵
      • Process spawned unexpected child process
      • Program crash
      PID:4924
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 476 -p 4164 -ip 4164
    1⤵
      PID:1976

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2108-145-0x0000000000000000-mapping.dmp
    • memory/2152-139-0x0000000000000000-mapping.dmp
    • memory/2152-147-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/2152-148-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/2152-149-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/2152-146-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/4164-135-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/4164-138-0x00007FFB49200000-0x00007FFB49210000-memory.dmp
      Filesize

      64KB

    • memory/4164-137-0x00007FFB49200000-0x00007FFB49210000-memory.dmp
      Filesize

      64KB

    • memory/4164-136-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/4164-132-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/4164-134-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB

    • memory/4164-133-0x00007FFB4B6D0000-0x00007FFB4B6E0000-memory.dmp
      Filesize

      64KB