Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7 -
submitted
04/07/2020, 09:43
Static task
static1
Behavioral task
behavioral1
Sample
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls
Resource
win7
Behavioral task
behavioral2
Sample
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls
Resource
win10v200430
General
-
Target
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls
-
Size
2.6MB
-
MD5
5e88543265f45782ccd0d313d1f9fdc0
-
SHA1
1006e031aaea7bd841141574fdefb49b051b12b2
-
SHA256
7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c
-
SHA512
96a456e52578203f244a07c51af3f1d0dbb3beeaa202896710b4b976d99c87501e447130f23faeb6b1ee11dbdb98affdefa2b66b1e64f0cfbf71f506a67b28bb
Malware Config
Signatures
-
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 1860 EQNEDT32.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\programdata\asc.txt:script1.vbs EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1152 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 22 IoCs
pid Process 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE 1152 EXCEL.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1152 EXCEL.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1656 1860 EQNEDT32.EXE 27 PID 1860 wrote to memory of 1656 1860 EQNEDT32.EXE 27 PID 1860 wrote to memory of 1656 1860 EQNEDT32.EXE 27 PID 1860 wrote to memory of 1656 1860 EQNEDT32.EXE 27 PID 1656 wrote to memory of 1548 1656 cmd.exe 29 PID 1656 wrote to memory of 1548 1656 cmd.exe 29 PID 1656 wrote to memory of 1548 1656 cmd.exe 29 PID 1656 wrote to memory of 1548 1656 cmd.exe 29 PID 1152 wrote to memory of 2024 1152 EXCEL.EXE 30 PID 1152 wrote to memory of 2024 1152 EXCEL.EXE 30 PID 1152 wrote to memory of 2024 1152 EXCEL.EXE 30 PID 1548 wrote to memory of 1180 1548 cscript.exe 32 PID 1548 wrote to memory of 1180 1548 cscript.exe 32 PID 1548 wrote to memory of 1180 1548 cscript.exe 32 PID 1548 wrote to memory of 1180 1548 cscript.exe 32 PID 1180 wrote to memory of 1640 1180 cmd.exe 34 PID 1180 wrote to memory of 1640 1180 cmd.exe 34 PID 1180 wrote to memory of 1640 1180 cmd.exe 34 PID 1180 wrote to memory of 1640 1180 cmd.exe 34 -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 2024 1152 wscript.exe 23 -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\7198265049b9ae07283726cd4a15a92421eed0ae8ce943971c5e6b7626913e5c.bin.xls1⤵
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\System32\wscript.exeC:\Windows\System32\wscript.exe C:\programdata\asc.txt:script1.vbs2⤵
- Process spawned unexpected child process
PID:2024
-
-
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.execmd /c ren %tmp%\yy r.js&cScRiPT %tmp%\r.js C2⤵
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\cscript.execScRiPT C:\Users\Admin\AppData\Local\Temp\r.js C3⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cscript C:\Users\Admin\AppData\Local\Temp\xx.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp\xx.vbs5⤵PID:1640
-
-
-
-