Analysis

  • max time kernel
    195s
  • max time network
    207s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-11-2022 11:42

General

  • Target

    2c51b60afd53c78a31d96673a9ff33bf6d4eec17c774e8cf1dde2018b90b425a.xls

  • Size

    22KB

  • MD5

    013c90d7a07e365e82fd8ed0103efbe9

  • SHA1

    cf103af76d477d41d25b549c3a17569382631171

  • SHA256

    2c51b60afd53c78a31d96673a9ff33bf6d4eec17c774e8cf1dde2018b90b425a

  • SHA512

    37777260556137d7a611a4702cfc91a66a993a58488c17735858fea027a15b0d9c788c38d687b56bfb9446d2d5a143624d6914a78a5d395692aac04e5ca7e00d

  • SSDEEP

    192:gx5Hh439gyLPUVWYqJo+kIy1PfT468H/y/VDCnnQn1bcYDHBjFNjZDa6X:I7WYqJofIypL46QaNGnQn1oYDHBp

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2c51b60afd53c78a31d96673a9ff33bf6d4eec17c774e8cf1dde2018b90b425a.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4152
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" "C:\Users\Admin\AppData\Local\Temp\windows.vbs"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      PID:3960
    • C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE
      "C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 3668
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:3152
      • C:\Windows\system32\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 3668
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:3580

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\windows.vbs

    Filesize

    5KB

    MD5

    14c05d47ae9cd4cacd336604eed770cb

    SHA1

    8b2137d85a7b593b81dd48f62a3a47659aa0799a

    SHA256

    9d8af90ce1ad861305de4da0dcdb0253e51b164a505e6b126492413fc0ceb5ef

    SHA512

    8f12c44917ba6ca5d02494a247256aa5110d753b272df5595df8e6905e68af122c290f11fd0366994b5b05a997dc8723b498b4bf13e2bbd88dd72158e6453ba9

  • memory/3152-141-0x0000000000000000-mapping.dmp

  • memory/3580-147-0x0000000000000000-mapping.dmp

  • memory/3960-139-0x0000000000000000-mapping.dmp

  • memory/4152-132-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/4152-133-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/4152-134-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/4152-135-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/4152-136-0x00007FF9F1110000-0x00007FF9F1120000-memory.dmp

    Filesize

    64KB

  • memory/4152-137-0x00007FF9EEB20000-0x00007FF9EEB30000-memory.dmp

    Filesize

    64KB

  • memory/4152-138-0x00007FF9EEB20000-0x00007FF9EEB30000-memory.dmp

    Filesize

    64KB