Analysis
-
max time kernel
151s -
max time network
59s -
platform
windows7_x64 -
resource
win7v200722 -
submitted
04-09-2020 05:25
Static task
static1
Behavioral task
behavioral1
Sample
KAAS GROUP CO LLC PROJECT - REQUIREMENTS QUANTITY.xlsx
Resource
win7v200722
Behavioral task
behavioral2
Sample
KAAS GROUP CO LLC PROJECT - REQUIREMENTS QUANTITY.xlsx
Resource
win10
General
-
Target
KAAS GROUP CO LLC PROJECT - REQUIREMENTS QUANTITY.xlsx
-
Size
727KB
-
MD5
8bb4b1de922189a0ead4d3d53f90dee2
-
SHA1
f9f8e5cce299de26c7c4597466283de3fca99052
-
SHA256
3b20874d61fc9dccaf568e149987fa2d6b856b91822237394e778dd4ef989620
-
SHA512
7daf835a914b78e5849e1ea82c9ae94df2a6b75e2aebabd6031bfb0b7db577bc4c5f7bc8c7f9f5be5fd37c71d252c643b19f0a167a190ed2be8b6e561677ff98
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
Processes:
explorer.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe -
Blacklisted process makes network request 1 IoCs
Processes:
EQNEDT32.EXEflow pid process 6 1672 EQNEDT32.EXE -
Executes dropped EXE 1 IoCs
Processes:
vbc.exepid process 268 vbc.exe -
Sets file execution options in registry 2 TTPs
-
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
explorer.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXErundll32.exepid process 1672 EQNEDT32.EXE 1672 EQNEDT32.EXE 1672 EQNEDT32.EXE 928 rundll32.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 6 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\y1377a177m.exe\"" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Google Updater 2.0 = "C:\\ProgramData\\Google Updater 2.0\\y1377a177m.exe" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Windows\CurrentVersion\Run\Google Updater 2.0 = "\"C:\\ProgramData\\Google Updater 2.0\\y1377a177m.exe\"" explorer.exe -
Processes:
cmd.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA cmd.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
explorer.exedescription ioc process File opened for modification C:\ProgramData\Google Updater 2.0\desktop.ini explorer.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 9 IoCs
Processes:
cmd.exeexplorer.exepid process 2040 cmd.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe -
NSIS installer 10 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 \Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_1 C:\Users\Admin\AppData\Roaming\vbc.exe nsis_installer_2 -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
cmd.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cmd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cmd.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
explorer.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer explorer.exe -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\VersionManager explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\VersionManager\DownloadVersionList = "0" explorer.exe Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000\Software\Microsoft\Internet Explorer\Main\NoProtectedModeBanner = "1" explorer.exe -
Modifies registry class 280 IoCs
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcCheckBox" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC2-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9}\ = "IImage" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{F8F70670-5FB2-4E79-A323-64B12E2F0B55}\2.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Excel8.0\\MSForms.exd" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{04598FC1-866C-11CF-AB7C-00AA00C08FCF}\ = "ILabelControl" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC4-866C-11CF-AB7C-00AA00C08FCF}\ = "ICommandButton" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{F8F70670-5FB2-4E79-A323-64B12E2F0B55}\2.0\FLAGS\ = "6" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{79176FB3-B7F2-11CE-97EF-00AA006D2776} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D12-EC42-11CE-9E0D-00AA006002F3}\ = "MdcTextEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5B9D8FC8-4A71-101B-97A6-00000B65C08B}\ = "FormEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE6-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074}\ = "IReturnBoolean" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C91-BA84-11CF-8110-00A0C9030074}\ = "IReturnEffect" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D22-EC42-11CE-9E0D-00AA006002F3}\ = "MdcListEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D43-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\TypeLib\{F8F70670-5FB2-4E79-A323-64B12E2F0B55}\2.0 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{CF3F94A0-F546-11CE-9BCE-00AA00608E01} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D11F-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLPassword" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE3-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents4" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents6" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F8F70670-5FB2-4E79-A323-64B12E2F0B55}\2.0\0\win32 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{8BD21D53-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcOptionButton" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLImage" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLHidden" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents2" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{47FF8FE5-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLReset" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D117-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLCheckbox" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{5512D125-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLTextArea" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{8BD21D52-EC42-11CE-9E0D-00AA006002F3}\ = "MdcOptionButtonEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{7B020EC8-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F8F70670-5FB2-4E79-A323-64B12E2F0B55} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{EC72F590-F375-11CE-B9E8-00AA006B1A69} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Wow6432Node\Interface\{4C599243-6926-101B-9992-00000B65C6F9} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2090973689-680783404-4292415065-1000_CLASSES\Interface\{5512D11D-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1452 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
rundll32.exeexplorer.exepid process 928 rundll32.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
rundll32.execmd.exeexplorer.exepid process 928 rundll32.exe 2040 cmd.exe 2040 cmd.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe 1432 explorer.exe -
Suspicious use of AdjustPrivilegeToken 28 IoCs
Processes:
cmd.exeexplorer.exedescription pid process Token: SeDebugPrivilege 2040 cmd.exe Token: SeRestorePrivilege 2040 cmd.exe Token: SeBackupPrivilege 2040 cmd.exe Token: SeLoadDriverPrivilege 2040 cmd.exe Token: SeCreatePagefilePrivilege 2040 cmd.exe Token: SeShutdownPrivilege 2040 cmd.exe Token: SeTakeOwnershipPrivilege 2040 cmd.exe Token: SeChangeNotifyPrivilege 2040 cmd.exe Token: SeCreateTokenPrivilege 2040 cmd.exe Token: SeMachineAccountPrivilege 2040 cmd.exe Token: SeSecurityPrivilege 2040 cmd.exe Token: SeAssignPrimaryTokenPrivilege 2040 cmd.exe Token: SeCreateGlobalPrivilege 2040 cmd.exe Token: 33 2040 cmd.exe Token: SeDebugPrivilege 1432 explorer.exe Token: SeRestorePrivilege 1432 explorer.exe Token: SeBackupPrivilege 1432 explorer.exe Token: SeLoadDriverPrivilege 1432 explorer.exe Token: SeCreatePagefilePrivilege 1432 explorer.exe Token: SeShutdownPrivilege 1432 explorer.exe Token: SeTakeOwnershipPrivilege 1432 explorer.exe Token: SeChangeNotifyPrivilege 1432 explorer.exe Token: SeCreateTokenPrivilege 1432 explorer.exe Token: SeMachineAccountPrivilege 1432 explorer.exe Token: SeSecurityPrivilege 1432 explorer.exe Token: SeAssignPrimaryTokenPrivilege 1432 explorer.exe Token: SeCreateGlobalPrivilege 1432 explorer.exe Token: 33 1432 explorer.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1452 EXCEL.EXE 1452 EXCEL.EXE 1452 EXCEL.EXE -
Suspicious use of WriteProcessMemory 83 IoCs
Processes:
EQNEDT32.EXEvbc.exerundll32.execmd.exeexplorer.exedescription pid process target process PID 1672 wrote to memory of 268 1672 EQNEDT32.EXE vbc.exe PID 1672 wrote to memory of 268 1672 EQNEDT32.EXE vbc.exe PID 1672 wrote to memory of 268 1672 EQNEDT32.EXE vbc.exe PID 1672 wrote to memory of 268 1672 EQNEDT32.EXE vbc.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 268 wrote to memory of 928 268 vbc.exe rundll32.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 928 wrote to memory of 2040 928 rundll32.exe cmd.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 2040 wrote to memory of 1432 2040 cmd.exe explorer.exe PID 1432 wrote to memory of 1124 1432 explorer.exe Dwm.exe PID 1432 wrote to memory of 1124 1432 explorer.exe Dwm.exe PID 1432 wrote to memory of 1124 1432 explorer.exe Dwm.exe PID 1432 wrote to memory of 1124 1432 explorer.exe Dwm.exe PID 1432 wrote to memory of 1124 1432 explorer.exe Dwm.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\KAAS GROUP CO LLC PROJECT - REQUIREMENTS QUANTITY.xlsx"2⤵
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blacklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\vbc.exe"C:\Users\Admin\AppData\Roaming\vbc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe ShoonCataclysm,Uboats3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"4⤵
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe5⤵
- Modifies firewall policy service
- Checks BIOS information in registry
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\Bonehead
-
C:\Users\Admin\AppData\Local\Temp\ShoonCataclysm.DLL
-
C:\Users\Admin\AppData\Roaming\vbc.exe
-
C:\Users\Admin\AppData\Roaming\vbc.exe
-
\Users\Admin\AppData\Local\Temp\ShoonCataclysm.dll
-
\Users\Admin\AppData\Roaming\vbc.exe
-
\Users\Admin\AppData\Roaming\vbc.exe
-
\Users\Admin\AppData\Roaming\vbc.exe
-
memory/268-4-0x0000000000000000-mapping.dmp
-
memory/928-7-0x0000000000000000-mapping.dmp
-
memory/928-14-0x0000000000350000-0x0000000000385000-memory.dmpFilesize
212KB
-
memory/1432-19-0x0000000000000000-mapping.dmp
-
memory/1432-20-0x00000000750C0000-0x00000000750FC000-memory.dmpFilesize
240KB
-
memory/1432-21-0x0000000075320000-0x0000000075327000-memory.dmpFilesize
28KB
-
memory/1432-22-0x0000000074890000-0x00000000748AC000-memory.dmpFilesize
112KB
-
memory/1452-10-0x00000000024D0000-0x00000000024D1000-memory.dmpFilesize
4KB
-
memory/1452-8-0x00000000024D0000-0x00000000024D1000-memory.dmpFilesize
4KB
-
memory/1596-0-0x000007FEF8670000-0x000007FEF88EA000-memory.dmpFilesize
2.5MB
-
memory/2040-15-0x0000000000000000-mapping.dmp
-
memory/2040-16-0x0000000000400000-0x0000000000435000-memory.dmpFilesize
212KB
-
memory/2040-17-0x0000000002080000-0x0000000002133000-memory.dmpFilesize
716KB
-
memory/2040-18-0x0000000002CA0000-0x0000000002E21000-memory.dmpFilesize
1.5MB