Analysis
-
max time kernel
150s -
max time network
39s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
07-07-2020 09:23
Static task
static1
Behavioral task
behavioral1
Sample
order details.EXCEL.XLSx.xls.io.exe
Resource
win7v200430
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
order details.EXCEL.XLSx.xls.io.exe
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
order details.EXCEL.XLSx.xls.io.exe
-
Size
359KB
-
MD5
140e89a0319fc70aa12f5523cb2df432
-
SHA1
b08e8aca4dd650de5ef73f13ebc3eba71da12655
-
SHA256
d1c9b6cc284f964d7a65df78137c404f2d24562354681f64433c7e2f25e30588
-
SHA512
e8c4f988cbff65bebecd4bfcda3473a354f2dac1bf646dab930c08924d876a11b937004859800b5544f2de7c5a73a3771b8275a16540dca6c9c876afff846020
Malware Config
Signatures
-
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1356 wrote to memory of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 PID 1804 wrote to memory of 512 1804 order details.EXCEL.XLSx.xls.io.exe 28 PID 1804 wrote to memory of 512 1804 order details.EXCEL.XLSx.xls.io.exe 28 PID 1804 wrote to memory of 512 1804 order details.EXCEL.XLSx.xls.io.exe 28 PID 1804 wrote to memory of 512 1804 order details.EXCEL.XLSx.xls.io.exe 28 -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1356 set thread context of 1804 1356 order details.EXCEL.XLSx.xls.io.exe 26 -
Suspicious use of AdjustPrivilegeToken 32 IoCs
description pid Process Token: SeImpersonatePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeTcbPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeChangeNotifyPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeCreateTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeBackupPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeRestorePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeIncreaseQuotaPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeAssignPrimaryTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeImpersonatePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeTcbPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeChangeNotifyPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeCreateTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeBackupPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeRestorePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeIncreaseQuotaPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeAssignPrimaryTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeImpersonatePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeTcbPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeChangeNotifyPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeCreateTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeBackupPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeRestorePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeIncreaseQuotaPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeAssignPrimaryTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeImpersonatePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeTcbPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeChangeNotifyPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeCreateTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeBackupPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeRestorePrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeIncreaseQuotaPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe Token: SeAssignPrimaryTokenPrivilege 1804 order details.EXCEL.XLSx.xls.io.exe -
Deletes itself 1 IoCs
pid Process 512 cmd.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks for installed software on the system 1 TTPs 10 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{00203668-8170-44A0-BE44-B632FA4D780F}\DisplayName order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{92FB6C44-E685-45AD-9B20-CADF4CABA132}.KB4087364\DisplayName order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{AC76BA86-7AD7-1033-7B44-A90000000001}\DisplayName order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ca67548a-5ebe-413a-b50c-4b9ceb6d66c6}\DisplayName order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{ef6b00ec-13e1-4c25-9064-b2f383cb8412}\DisplayName order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Google Chrome\DisplayName order details.EXCEL.XLSx.xls.io.exe Key enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Adobe AIR\DisplayName order details.EXCEL.XLSx.xls.io.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{f4220b74-9edd-4ded-bc8b-0342c1e164d8}\DisplayName order details.EXCEL.XLSx.xls.io.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall order details.EXCEL.XLSx.xls.io.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\order details.EXCEL.XLSx.xls.io.exe"C:\Users\Admin\AppData\Local\Temp\order details.EXCEL.XLSx.xls.io.exe"1⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of SetThreadContext
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\order details.EXCEL.XLSx.xls.io.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Checks for installed software on the system
PID:1804 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\147015.bat" "C:\Users\Admin\AppData\Local\Temp\order details.EXCEL.XLSx.xls.io.exe" "3⤵
- Deletes itself
PID:512
-
-