Overview
overview
10Static
static
8eicar-stan...nt.pdf
windows7-x64
3eicar-stan...nt.pdf
windows10-2004-x64
3eicar-stan...rt.pdf
windows7-x64
3eicar-stan...rt.pdf
windows10-2004-x64
3eicar-stan...om.com
windows7-x64
eicar-stan...om.com
windows10-2004-x64
eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
1eicar-stan...o.xlsx
windows7-x64
10eicar-stan...o.xlsx
windows10-2004-x64
1eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
10eicar-stan...o.xlsm
windows7-x64
10eicar-stan...o.xlsm
windows10-2004-x64
10eicar-stan...ox.xls
windows7-x64
3eicar-stan...ox.xls
windows10-2004-x64
1eicar-stan...x.xlsm
windows7-x64
3eicar-stan...x.xlsm
windows10-2004-x64
1eicar-stan...ho.xls
windows7-x64
10eicar-stan...ho.xls
windows10-2004-x64
10eicar-stan...o.xlsm
windows7-x64
10eicar-stan...o.xlsm
windows10-2004-x64
10eicar-stan...le.xls
windows7-x64
3eicar-stan...le.xls
windows10-2004-x64
1eicar-stan...e.xlsm
windows7-x64
3eicar-stan...e.xlsm
windows10-2004-x64
1eicar-stan...ox.pps
windows7-x64
3eicar-stan...ox.pps
windows10-2004-x64
1eicar-stan...x.pptm
windows7-x64
3eicar-stan...x.pptm
windows10-2004-x64
1eicar-stan...ho.pps
windows7-x64
10eicar-stan...ho.pps
windows10-2004-x64
1Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 20:40
Behavioral task
behavioral1
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-attachment.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-javascript-alert.pdf
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
eicar-standard-antivirus-test-files/eicar-adobe-acrobat-javascript-alert.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
eicar-standard-antivirus-test-files/eicar-com.com
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
eicar-standard-antivirus-test-files/eicar-com.com
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xls
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xlsx
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
eicar-standard-antivirus-test-files/eicar-excel-dde-cmd-powershell-echo.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
Resource
win7-20241010-en
Behavioral task
behavioral12
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-cmd-echo.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xls
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-msgbox.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xls
Resource
win7-20241023-en
Behavioral task
behavioral20
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xls
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
eicar-standard-antivirus-test-files/eicar-excel-macro-write-file.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pps
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pps
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-macro-msgbox.pptm
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-powershell-echo.pps
Resource
win7-20241023-en
Behavioral task
behavioral32
Sample
eicar-standard-antivirus-test-files/eicar-powerpoint-action-powershell-echo.pps
Resource
win10v2004-20241007-en
General
-
Target
eicar-standard-antivirus-test-files/eicar-excel-macro-powershell-echo.xlsm
-
Size
11KB
-
MD5
9bfbd61f017780a547de363a670c2fa0
-
SHA1
98c2d4049f283d2a78e10f685fc8849ede58b2eb
-
SHA256
75a444008d2ec38b2de7dc35e5da389c266c5fb689b6f3dc639a869a1c3f0a5b
-
SHA512
824766f425b90fb9191e12011e4d407ee50d1d5a0daab7c92ed8c63b0b85aae8ad1bf3c6ab3238b4a4a1991d856f2453eb1ebe38f85413f0851afedf6760f941
-
SSDEEP
192:HeoDZW59dm88DfieY63G4lV8f2UVw0QxizT3W7+p+1iTvflLIn:HeoavpAiXkz8f2UVvQITMaTu
Malware Config
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2780 3028 powershell.exe 29 -
Obfuscated Files or Information: Command Obfuscation 1 TTPs
Adversaries may obfuscate content during command execution to impede detection.
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXCEL.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3028 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2780 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2780 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3028 EXCEL.EXE 3028 EXCEL.EXE 3028 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3028 wrote to memory of 2780 3028 EXCEL.EXE 30 PID 3028 wrote to memory of 2780 3028 EXCEL.EXE 30 PID 3028 wrote to memory of 2780 3028 EXCEL.EXE 30 PID 3028 wrote to memory of 2780 3028 EXCEL.EXE 30
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\eicar-standard-antivirus-test-files\eicar-excel-macro-powershell-echo.xlsm1⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -NoExit -EncodedCommand ZQBjAGgAbwAgACIAWAA1AE8AIQBQACUAQABBAFAAWwA0AFwAUABaAFgANQA0ACgAUABeACkANwBDAEMAKQA3AH0AYAAkAEUASQBDAEEAUgAtAFMAVABBAE4ARABBAFIARAAtAEEATgBUAEkAVgBJAFIAVQBTAC0AVABFAFMAVAAtAEYASQBMAEUAIQBgACQASAArAEgAKgAiAA==2⤵
- Process spawned unexpected child process
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-