Analysis
-
max time kernel
245s -
max time network
337s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 11:14
Behavioral task
behavioral1
Sample
a95de40a4186a1ca2d8133a297df6986cc5237113fe4547d5fa9e96818e6203a.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
a95de40a4186a1ca2d8133a297df6986cc5237113fe4547d5fa9e96818e6203a.xls
Resource
win10v2004-20220901-en
General
-
Target
a95de40a4186a1ca2d8133a297df6986cc5237113fe4547d5fa9e96818e6203a.xls
-
Size
92KB
-
MD5
ea29b0a3a0c9f6fcf5d86f129893b504
-
SHA1
761793e49cd694cd7c30d1ce166fd6791cddf67d
-
SHA256
a95de40a4186a1ca2d8133a297df6986cc5237113fe4547d5fa9e96818e6203a
-
SHA512
080511bed324aca266ba924a2a56ebe372b299f74573081f0efc90196f4a52fe63e244ac1a1ef88fba20a0648cba610426fd87747d6127b2dba998ec728092cd
-
SSDEEP
1536:gFFFFpX0t6n53/9v64daUl5n2jcc0lbxOvTgZFcfraWWt2XKBriwNM3b:kb2jcc0lbxOrLjbadicM3b
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1072 1156 cmd.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1956 1156 cmd.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 564 1156 cmd.exe 27 -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1156 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1156 EXCEL.EXE 1156 EXCEL.EXE 1156 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1156 wrote to memory of 1072 1156 EXCEL.EXE 28 PID 1156 wrote to memory of 1072 1156 EXCEL.EXE 28 PID 1156 wrote to memory of 1072 1156 EXCEL.EXE 28 PID 1156 wrote to memory of 1072 1156 EXCEL.EXE 28 PID 1156 wrote to memory of 1956 1156 EXCEL.EXE 30 PID 1156 wrote to memory of 1956 1156 EXCEL.EXE 30 PID 1156 wrote to memory of 1956 1156 EXCEL.EXE 30 PID 1156 wrote to memory of 1956 1156 EXCEL.EXE 30 PID 1156 wrote to memory of 564 1156 EXCEL.EXE 31 PID 1156 wrote to memory of 564 1156 EXCEL.EXE 31 PID 1156 wrote to memory of 564 1156 EXCEL.EXE 31 PID 1156 wrote to memory of 564 1156 EXCEL.EXE 31 PID 1072 wrote to memory of 1664 1072 cmd.exe 34 PID 1072 wrote to memory of 1664 1072 cmd.exe 34 PID 1072 wrote to memory of 1664 1072 cmd.exe 34 PID 1072 wrote to memory of 1664 1072 cmd.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1664 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\a95de40a4186a1ca2d8133a297df6986cc5237113fe4547d5fa9e96818e6203a.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:1664
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1956
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:564
-