Overview
overview
10Static
static
8eicar-stan...nt.pdf
windows7-x64
3eicar-stan...nt.pdf
windows10-2004-x64
3eicar-stan...rt.pdf
windows7-x64
3eicar-stan...rt.pdf
windows10-2004-x64
3eicar-stan...om.com
windows7-x64
eicar-stan...om.com
windows10-2004-x64
eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
1eicar-stan...o.xlsx
windows7-x64
10eicar-stan...o.xlsx
windows10-2004-x64
1eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
10eicar-stan...o.xlsm
windows7-x64
10eicar-stan...o.xlsm
windows10-2004-x64
10eicar-stan...ox.xls
windows7-x64
3eicar-stan...ox.xls
windows10-2004-x64
1eicar-stan...x.xlsm
windows7-x64
3eicar-stan...x.xlsm
windows10-2004-x64
1eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
10eicar-stan...o.xlsm
windows7-x64
10eicar-stan...o.xlsm
windows10-2004-x64
10eicar-stan...le.xls
windows7-x64
3eicar-stan...le.xls
windows10-2004-x64
1eicar-stan...e.xlsm
windows7-x64
3eicar-stan...e.xlsm
windows10-2004-x64
1eicar-stan...ox.pps
windows7-x64
3eicar-stan...ox.pps
windows10-2004-x64
1eicar-stan...x.pptm
windows7-x64
3eicar-stan...x.pptm
windows10-2004-x64
1eicar-stan...ho.pps
windows7-x64
10eicar-stan...ho.pps
windows10-2004-x64
1Analysis
-
max time kernel
133s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 20:40
Behavioral task
behavioral1
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-javascript-alert.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-javascript-alert.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
eicar-standard-antivirus-test-files/eicar-com.com
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
eicar-standard-antivirus-test-files/eicar-com.com
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xls
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xls
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xls
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xls
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pps
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pps
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-powershell-echo.pps
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-powershell-echo.pps
Resource
win10v2004-20241007-en
General
-
Target
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
-
Size
30KB
-
MD5
5fa1d1c2389d123ebb7c4c7312dfac73
-
SHA1
8c8ec8577da8e370297413cd65ee8f99578077bb
-
SHA256
e8f8f28cca8ff5e02b52d8131be2f63b59ac38f64fc4bf7640334765ad6a14ba
-
SHA512
2b54614c54eff346483952afb5f5dfc4afc0aa59c80bdbf49ddcab8d4d48b3190a45b885adea0daff23bb7fe24030add67a5d2f1277fc918442b61153302d4f7
-
SSDEEP
768:uik3hOdsylKlgryzc4bNhZFGzE+cL2knAJ6OiCkhaBwAo946B8R:Pk3hOdsylKlgryzc4bNhZFGzE+cL2knm
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4936 1392 cmd.exe 82 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1392 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE 1392 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1392 wrote to memory of 4936 1392 EXCEL.EXE 86 PID 1392 wrote to memory of 4936 1392 EXCEL.EXE 86
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\eicar-standard-antivirus-test-files\eicar-excel-macro-cmd-echo.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SYSTEM32\cmd.execmd.exe /K echo X5O!P%@AP[4\PZX54(P^^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*2⤵
- Process spawned unexpected child process
PID:4936
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize1KB
MD5a74ab4c0c9e19b8fd370acedd551fe42
SHA1eaf9d284db343730c8fecf7c8c5a3d43074d9808
SHA2560b8192aa24bc4c391e2358aa3154a681a2c6f2e91a6c076a446cb88da3bd6707
SHA512b318b7db56e5a4e47ed106b8b1053f222dde182e3d083566d16023eca19b5973e2fd0d4dbd9abd1a8f425471ca9b7adfd41379002db0ebe69c1336dbad2d2cbd