Analysis

  • max time kernel
    208s
  • max time network
    199s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2022 17:16

General

  • Target

    ~ar6759.xls

  • Size

    107KB

  • MD5

    ae89cf6ba9007c82060c00e004ca8a1e

  • SHA1

    c25329af0c5edd0260744a89f25c36ae336c5792

  • SHA256

    2609fc43379c7572ab4b9e15ca5b8408c42b071caceb6e45384b85b30df60979

  • SHA512

    5c4fcfeaaca3dc6195c913cce1aa8ee9c394cfd11e4ccab373bd7b83c6bb70f84f78af10bf01525810a382baf118424b2404f7b5ef7717fb7b3901f19cd3e8ab

  • SSDEEP

    3072:8i9QUDGYwk/u1Q5y21afgjs8KA6bLhmvjKESzz6u/lmpYj:8i9QUDGYwk/u1Q5y21afgjs8KA6bLhmq

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\~ar6759.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Windows\SysWOW64\rundll32.exe
      C:\Windows\SysWOW64\rundll32.exe
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      PID:2000
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe shell32.dll,SHCreateLocalServerRunDll {c82192ee-6cb5-4bc0-9ef0-fb818773790a} -Embedding
    1⤵
      PID:3716
    • C:\Windows\System32\rundll32.exe
      C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
      1⤵
        PID:3904

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      2
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2000-139-0x0000000002E80000-0x0000000003280000-memory.dmp
        Filesize

        4.0MB

      • memory/2000-140-0x0000000002E80000-0x0000000003280000-memory.dmp
        Filesize

        4.0MB

      • memory/3464-132-0x00007FF83FCF0000-0x00007FF83FD00000-memory.dmp
        Filesize

        64KB

      • memory/3464-133-0x00007FF83FCF0000-0x00007FF83FD00000-memory.dmp
        Filesize

        64KB

      • memory/3464-134-0x00007FF83FCF0000-0x00007FF83FD00000-memory.dmp
        Filesize

        64KB

      • memory/3464-135-0x00007FF83FCF0000-0x00007FF83FD00000-memory.dmp
        Filesize

        64KB

      • memory/3464-136-0x00007FF83FCF0000-0x00007FF83FD00000-memory.dmp
        Filesize

        64KB

      • memory/3464-137-0x00007FF83D570000-0x00007FF83D580000-memory.dmp
        Filesize

        64KB

      • memory/3464-138-0x00007FF83D570000-0x00007FF83D580000-memory.dmp
        Filesize

        64KB