Analysis
-
max time kernel
300s -
max time network
296s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
27-11-2020 03:11
General
-
Target
1_4_3.xls
-
Size
270KB
-
MD5
890522e2846bc9ae0ee808db164ccdb5
-
SHA1
36b93a892a6f57abec6c40268ff9101ac45a0ca8
-
SHA256
a612370e45b7c1121a2ab805c05e67722070d4a9d553d4f1dfb1ddb6f1073567
-
SHA512
0d1241bf55d42513d11fdbff65a427c47a85db18185dcee3bbb9a1b9abf6c9cb4763d92812550cd59817e62744fd0ec955067a4a15925f0293ad36176d6c385d
Malware Config
Extracted
trickbot
1000508
yas31
164.132.255.19:443
188.119.113.114:443
176.119.159.147:443
51.254.164.243:443
178.156.202.251:443
185.234.72.24:443
194.5.250.52:443
217.12.209.244:443
185.99.2.123:443
185.198.57.75:443
93.189.42.81:443
148.251.185.186:443
79.137.101.2:443
51.89.115.121:443
91.200.100.84:443
194.5.250.69:443
185.14.30.45:443
185.99.2.142:443
107.175.133.162:443
5.196.247.14:443
190.214.13.2:449
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
202.29.215.114:449
171.100.142.238:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
103.227.147.82:449
96.9.77.56:449
103.5.231.188:449
110.93.15.98:449
200.171.101.169:449
-
autorunName:pwgrab
Signatures
-
Dave packer 1 IoCs
Detects executable packed with a packer named 'Dave' from the community, due to a string at the end of it.
Processes:
resource yara_rule behavioral1/memory/3616-6-0x00000000005A0000-0x00000000005D2000-memory.dmp dave -
Executes dropped EXE 1 IoCs
Processes:
zvkFulz.exepid process 3616 zvkFulz.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1192 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
zvkFulz.exepid process 3616 zvkFulz.exe 3616 zvkFulz.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 3768 wermgr.exe Token: SeDebugPrivilege 3768 wermgr.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 1192 EXCEL.EXE 1192 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE 1192 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
EXCEL.EXEzvkFulz.exedescription pid process target process PID 1192 wrote to memory of 3616 1192 EXCEL.EXE zvkFulz.exe PID 1192 wrote to memory of 3616 1192 EXCEL.EXE zvkFulz.exe PID 1192 wrote to memory of 3616 1192 EXCEL.EXE zvkFulz.exe PID 3616 wrote to memory of 3768 3616 zvkFulz.exe wermgr.exe PID 3616 wrote to memory of 3768 3616 zvkFulz.exe wermgr.exe PID 3616 wrote to memory of 3768 3616 zvkFulz.exe wermgr.exe PID 3616 wrote to memory of 3768 3616 zvkFulz.exe wermgr.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1_4_3.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\zvkFulz.exe"C:\ProgramData\zvkFulz.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\zvkFulz.exeMD5
77a77a822913d06e366eceac8fb3a036
SHA19a33cfc1d1be4bf40e1f7e47e55e28c43ea737fd
SHA256c9c1eeaaee5a2d6f0f1d7771b2c0fe2520a363d9942b56d85503485adcf8cb00
SHA5125d88306fd526829db38d4a606c7132848d719e494034c5df7a56280f89175903ef794fbcc07a2a6be0c7fb5ef36720ac53f7a5d4bc76f793e2ff2936fe9cd856
-
C:\ProgramData\zvkFulz.exeMD5
77a77a822913d06e366eceac8fb3a036
SHA19a33cfc1d1be4bf40e1f7e47e55e28c43ea737fd
SHA256c9c1eeaaee5a2d6f0f1d7771b2c0fe2520a363d9942b56d85503485adcf8cb00
SHA5125d88306fd526829db38d4a606c7132848d719e494034c5df7a56280f89175903ef794fbcc07a2a6be0c7fb5ef36720ac53f7a5d4bc76f793e2ff2936fe9cd856
-
memory/1192-2-0x00007FFC68C40000-0x00007FFC69277000-memory.dmpFilesize
6.2MB
-
memory/3616-3-0x0000000000000000-mapping.dmp
-
memory/3616-6-0x00000000005A0000-0x00000000005D2000-memory.dmpFilesize
200KB
-
memory/3616-7-0x0000000000720000-0x000000000074F000-memory.dmpFilesize
188KB
-
memory/3768-8-0x0000000000000000-mapping.dmp