Analysis
-
max time kernel
150s -
max time network
61s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
04-09-2020 09:25
Static task
static1
Behavioral task
behavioral1
Sample
PO-1364774 Final.xlsx
Resource
win7v200722
Behavioral task
behavioral2
Sample
PO-1364774 Final.xlsx
Resource
win10v200722
General
-
Target
PO-1364774 Final.xlsx
-
Size
749KB
-
MD5
2efbf412cd56c2203e8548512a68ef51
-
SHA1
5d0e3245ec2f35aaecfecb5cfa2af10db8e51451
-
SHA256
66b8e804eda79f364e6cd2ee2fdd967f199a1fe3dd7440e8c0ff313568f74531
-
SHA512
bfd71d8fa1c951b2705bab886060ebe926710ca32c9ea1a84f1caa586fd30c7e31804e27c7515632ad05ae78f18a4a68e93a56e10a8a9dece942496a8e0a8103
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe -
Blacklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 6 1356 EQNEDT32.EXE -
Executes dropped EXE 1 IoCs
Processes:
vbc.exepid process 1964 vbc.exe -
Sets file execution options in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXErundll32.exepid process 1356 EQNEDT32.EXE 1356 EQNEDT32.EXE 1356 EQNEDT32.EXE 428 rundll32.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\s7799og9.exe\"" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\s7799og9.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\s7799og9.exe\"" explorer.exe -
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\ProgramData\Google Updater 2.0\desktop.ini explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
cmd.exeexplorer.exepid process 1772 cmd.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe -
NSIS installer 10 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
explorer.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\VersionManager explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\VersionManager\DownloadVersionList = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
Modifies registry class 280 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC3-866C-11CF-AB7C-00AA00C08FCF}\ = "IScrollbar" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{944ACF93-A1E6-11CE-8104-00AA00611080}\ = "Tabs" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776}\ = "ISpinbutton" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0\ = "Microsoft Forms 2.0 Object Library" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F}\ = "MultiPageEvents" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0\0\win32 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0\0\win32 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{796ED650-5FE9-11CF-8D68-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB}\ = "Font" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Excel8.0\\MSForms.exd" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0\FLAGS EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5CEF5613-713D-11CE-80C9-00AA00611080}\ = "IPage" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69}\ = "IDataAutoWrapper" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCombo" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01}\ = "OptionFrameEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE4-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents5" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcToggleButton" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents7" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{7819BE5B-CBF0-45DC-BA26-011C0FF85904}\2.0\FLAGS\ = "6" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1332 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
rundll32.exeexplorer.exepid process 428 rundll32.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
rundll32.execmd.exeexplorer.exepid process 428 rundll32.exe 1772 cmd.exe 1772 cmd.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe 976 explorer.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
cmd.exeexplorer.exedescription pid process Token: SeDebugPrivilege 1772 cmd.exe Token: SeRestorePrivilege 1772 cmd.exe Token: SeBackupPrivilege 1772 cmd.exe Token: SeLoadDriverPrivilege 1772 cmd.exe Token: SeCreatePagefilePrivilege 1772 cmd.exe Token: SeShutdownPrivilege 1772 cmd.exe Token: SeTakeOwnershipPrivilege 1772 cmd.exe Token: SeChangeNotifyPrivilege 1772 cmd.exe Token: SeCreateTokenPrivilege 1772 cmd.exe Token: SeMachineAccountPrivilege 1772 cmd.exe Token: SeSecurityPrivilege 1772 cmd.exe Token: SeAssignPrimaryTokenPrivilege 1772 cmd.exe Token: SeCreateGlobalPrivilege 1772 cmd.exe Token: 33 1772 cmd.exe Token: SeDebugPrivilege 976 explorer.exe Token: SeRestorePrivilege 976 explorer.exe Token: SeBackupPrivilege 976 explorer.exe Token: SeLoadDriverPrivilege 976 explorer.exe Token: SeCreatePagefilePrivilege 976 explorer.exe Token: SeShutdownPrivilege 976 explorer.exe Token: SeTakeOwnershipPrivilege 976 explorer.exe Token: SeChangeNotifyPrivilege 976 explorer.exe Token: SeCreateTokenPrivilege 976 explorer.exe Token: SeMachineAccountPrivilege 976 explorer.exe Token: SeSecurityPrivilege 976 explorer.exe Token: SeAssignPrimaryTokenPrivilege 976 explorer.exe Token: SeCreateGlobalPrivilege 976 explorer.exe Token: 33 976 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1332 EXCEL.EXE 1332 EXCEL.EXE 1332 EXCEL.EXE -
Suspicious use of WriteProcessMemory 83 IoCs
Processes:
EQNEDT32.EXEvbc.exerundll32.execmd.exeexplorer.exedescription pid process target process PID 1356 wrote to memory of 1964 1356 EQNEDT32.EXE vbc.exe PID 1356 wrote to memory of 1964 1356 EQNEDT32.EXE vbc.exe PID 1356 wrote to memory of 1964 1356 EQNEDT32.EXE vbc.exe PID 1356 wrote to memory of 1964 1356 EQNEDT32.EXE vbc.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 1964 wrote to memory of 428 1964 vbc.exe rundll32.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 428 wrote to memory of 1772 428 rundll32.exe cmd.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 1772 wrote to memory of 976 1772 cmd.exe explorer.exe PID 976 wrote to memory of 1256 976 explorer.exe Dwm.exe PID 976 wrote to memory of 1256 976 explorer.exe Dwm.exe PID 976 wrote to memory of 1256 976 explorer.exe Dwm.exe PID 976 wrote to memory of 1256 976 explorer.exe Dwm.exe PID 976 wrote to memory of 1256 976 explorer.exe Dwm.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\PO-1364774 Final.xlsx"2⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\vbc.exe"C:\Users\Admin\AppData\Roaming\vbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe ShoonCataclysm,Uboats3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Bonehead
-
C:\Users\Admin\AppData\Local\Temp\ShoonCataclysm.DLL
-
C:\Users\Admin\AppData\Roaming\vbc.exe
-
C:\Users\Admin\AppData\Roaming\vbc.exe
-
\Users\Admin\AppData\Local\Temp\ShoonCataclysm.dll
-
\Users\Admin\AppData\Roaming\vbc.exe
-
\Users\Admin\AppData\Roaming\vbc.exe
-
\Users\Admin\AppData\Roaming\vbc.exe
-
memory/428-10-0x0000000000000000-mapping.dmp
-
memory/428-14-0x00000000008A0000-0x00000000008D5000-memory.dmpFilesize
212KB
-
memory/976-19-0x0000000000000000-mapping.dmp
-
memory/976-27-0x0000000074E70000-0x0000000074E8C000-memory.dmpFilesize
112KB
-
memory/976-26-0x00000000754F0000-0x00000000754F7000-memory.dmpFilesize
28KB
-
memory/976-25-0x0000000075380000-0x00000000753BC000-memory.dmpFilesize
240KB
-
memory/1332-7-0x00000000020B0000-0x00000000020B1000-memory.dmpFilesize
4KB
-
memory/1332-9-0x00000000020B0000-0x00000000020B1000-memory.dmpFilesize
4KB
-
memory/1484-0-0x000007FEF83B0000-0x000007FEF862A000-memory.dmpFilesize
2.5MB
-
memory/1772-16-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/1772-17-0x0000000002060000-0x0000000002113000-memory.dmpFilesize
716KB
-
memory/1772-18-0x0000000002CD0000-0x0000000002E51000-memory.dmpFilesize
1.5MB
-
memory/1772-15-0x0000000000000000-mapping.dmp
-
memory/1964-4-0x0000000000000000-mapping.dmp