Analysis
-
max time kernel
241s -
max time network
336s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 14:24
Behavioral task
behavioral1
Sample
781235d1ca9b542ec2657113d3471a5cfd4cf7b0d0d531d04696ea27735d4e6e.xls
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
781235d1ca9b542ec2657113d3471a5cfd4cf7b0d0d531d04696ea27735d4e6e.xls
Resource
win10v2004-20220901-en
General
-
Target
781235d1ca9b542ec2657113d3471a5cfd4cf7b0d0d531d04696ea27735d4e6e.xls
-
Size
150KB
-
MD5
4554c09a6eeb2c46b74d94283b25627b
-
SHA1
1a255760e8343225accffe055bdf173402bef643
-
SHA256
781235d1ca9b542ec2657113d3471a5cfd4cf7b0d0d531d04696ea27735d4e6e
-
SHA512
b0eab1403f462f584763422d6447c3e583ed8016b3c64d0f26fc8c2f70e20b89878d20f3c41395e78eaa87bec98a928f79176af825ac50f150681204f0e2465c
-
SSDEEP
3072:ABJuRoPuNXoJbXd0QdAgAG3EOSq6/cgfpUCIdf2jcc0lbxOKTDgq:GJuRoPuNXoJbXd0QdAgAG3EOSq6/cgfs
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1444 860 cmd.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1312 860 cmd.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 336 860 cmd.exe 27 -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 860 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 860 EXCEL.EXE 860 EXCEL.EXE 860 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 860 wrote to memory of 864 860 EXCEL.EXE 28 PID 860 wrote to memory of 864 860 EXCEL.EXE 28 PID 860 wrote to memory of 864 860 EXCEL.EXE 28 PID 860 wrote to memory of 864 860 EXCEL.EXE 28 PID 860 wrote to memory of 1444 860 EXCEL.EXE 29 PID 860 wrote to memory of 1444 860 EXCEL.EXE 29 PID 860 wrote to memory of 1444 860 EXCEL.EXE 29 PID 860 wrote to memory of 1444 860 EXCEL.EXE 29 PID 860 wrote to memory of 1312 860 EXCEL.EXE 30 PID 860 wrote to memory of 1312 860 EXCEL.EXE 30 PID 860 wrote to memory of 1312 860 EXCEL.EXE 30 PID 860 wrote to memory of 1312 860 EXCEL.EXE 30 PID 860 wrote to memory of 336 860 EXCEL.EXE 33 PID 860 wrote to memory of 336 860 EXCEL.EXE 33 PID 860 wrote to memory of 336 860 EXCEL.EXE 33 PID 860 wrote to memory of 336 860 EXCEL.EXE 33 PID 1444 wrote to memory of 932 1444 cmd.exe 35 PID 1444 wrote to memory of 932 1444 cmd.exe 35 PID 1444 wrote to memory of 932 1444 cmd.exe 35 PID 1444 wrote to memory of 932 1444 cmd.exe 35 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 932 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\781235d1ca9b542ec2657113d3471a5cfd4cf7b0d0d531d04696ea27735d4e6e.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:864
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:932
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:336
-