Analysis
-
max time kernel
193s -
max time network
35s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
06/12/2022, 17:13
Behavioral task
behavioral1
Sample
ffdfa39929f46eed536c24a6dfa4782e.xls
Resource
win7-20221111-en
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
ffdfa39929f46eed536c24a6dfa4782e.xls
Resource
win10v2004-20220812-en
8 signatures
150 seconds
General
-
Target
ffdfa39929f46eed536c24a6dfa4782e.xls
-
Size
105KB
-
MD5
ffdfa39929f46eed536c24a6dfa4782e
-
SHA1
9fd326568b54de228d7c4a7af5556776c5ec8199
-
SHA256
1843374f535f9ffa7c10df2555d37564e92a346235f74eedf3bbc13d505b0755
-
SHA512
4d4f47c206e29314e919b3b033d27ebec38743c805153c1c5dbd7cc1f45a8cfdab4f830f214e9cb351a71065a2b79321963f517dbb9a21f6e98508b5fb578dbc
-
SSDEEP
3072:kIk3hOdsylKlgryzc4bNhZFGzE+cL2knR/2jcc0lbxOGrJtXwyyOK8KxyT:Vk3hOdsylKlgryzc4bNhZF+E+W2knR0
Score
10/10
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 972 1448 cmd.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1616 1448 cmd.exe 27 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 700 1448 cmd.exe 27 -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1214520366-621468234-4062160515-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1448 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1448 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1448 wrote to memory of 972 1448 EXCEL.EXE 28 PID 1448 wrote to memory of 972 1448 EXCEL.EXE 28 PID 1448 wrote to memory of 972 1448 EXCEL.EXE 28 PID 1448 wrote to memory of 972 1448 EXCEL.EXE 28 PID 1448 wrote to memory of 1616 1448 EXCEL.EXE 30 PID 1448 wrote to memory of 1616 1448 EXCEL.EXE 30 PID 1448 wrote to memory of 1616 1448 EXCEL.EXE 30 PID 1448 wrote to memory of 1616 1448 EXCEL.EXE 30 PID 1448 wrote to memory of 700 1448 EXCEL.EXE 31 PID 1448 wrote to memory of 700 1448 EXCEL.EXE 31 PID 1448 wrote to memory of 700 1448 EXCEL.EXE 31 PID 1448 wrote to memory of 700 1448 EXCEL.EXE 31 PID 972 wrote to memory of 1100 972 cmd.exe 34 PID 972 wrote to memory of 1100 972 cmd.exe 34 PID 972 wrote to memory of 1100 972 cmd.exe 34 PID 972 wrote to memory of 1100 972 cmd.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 1100 attrib.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ffdfa39929f46eed536c24a6dfa4782e.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\attrib.exeattrib -S -h "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"3⤵
- Views/modifies file attributes
PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c Del /F /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:1616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c RD /S /Q "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\K4.XLS"2⤵
- Process spawned unexpected child process
PID:700
-