Analysis
-
max time kernel
129s -
max time network
123s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
06-12-2020 20:52
Behavioral task
behavioral1
Sample
1_4_3.xls
Resource
win7v20201028
General
-
Target
1_4_3.xls
-
Size
270KB
-
MD5
890522e2846bc9ae0ee808db164ccdb5
-
SHA1
36b93a892a6f57abec6c40268ff9101ac45a0ca8
-
SHA256
a612370e45b7c1121a2ab805c05e67722070d4a9d553d4f1dfb1ddb6f1073567
-
SHA512
0d1241bf55d42513d11fdbff65a427c47a85db18185dcee3bbb9a1b9abf6c9cb4763d92812550cd59817e62744fd0ec955067a4a15925f0293ad36176d6c385d
Malware Config
Extracted
trickbot
1000508
yas31
164.132.255.19:443
188.119.113.114:443
176.119.159.147:443
51.254.164.243:443
178.156.202.251:443
185.234.72.24:443
194.5.250.52:443
217.12.209.244:443
185.99.2.123:443
185.198.57.75:443
93.189.42.81:443
148.251.185.186:443
79.137.101.2:443
51.89.115.121:443
91.200.100.84:443
194.5.250.69:443
185.14.30.45:443
185.99.2.142:443
107.175.133.162:443
5.196.247.14:443
190.214.13.2:449
181.129.104.139:449
181.112.157.42:449
181.129.134.18:449
131.161.253.190:449
121.100.19.18:449
202.29.215.114:449
171.100.142.238:449
190.136.178.52:449
45.6.16.68:449
110.232.76.39:449
122.50.6.122:449
103.12.161.194:449
36.91.45.10:449
103.227.147.82:449
96.9.77.56:449
103.5.231.188:449
110.93.15.98:449
200.171.101.169:449
-
autorunName:pwgrab
Signatures
-
Dave packer 1 IoCs
Detects executable packed with a packer named 'Dave' from the community, due to a string at the end of it.
Processes:
resource yara_rule behavioral1/memory/584-6-0x0000000000350000-0x0000000000382000-memory.dmp dave -
Executes dropped EXE 1 IoCs
Processes:
zvkFulz.exepid process 584 zvkFulz.exe -
Loads dropped DLL 1 IoCs
Processes:
EXCEL.EXEpid process 1972 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1972 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
zvkFulz.exepid process 584 zvkFulz.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
wermgr.exedescription pid process Token: SeDebugPrivilege 920 wermgr.exe Token: SeDebugPrivilege 920 wermgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1972 EXCEL.EXE 1972 EXCEL.EXE 1972 EXCEL.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
EXCEL.EXEzvkFulz.exedescription pid process target process PID 1972 wrote to memory of 584 1972 EXCEL.EXE zvkFulz.exe PID 1972 wrote to memory of 584 1972 EXCEL.EXE zvkFulz.exe PID 1972 wrote to memory of 584 1972 EXCEL.EXE zvkFulz.exe PID 1972 wrote to memory of 584 1972 EXCEL.EXE zvkFulz.exe PID 584 wrote to memory of 920 584 zvkFulz.exe wermgr.exe PID 584 wrote to memory of 920 584 zvkFulz.exe wermgr.exe PID 584 wrote to memory of 920 584 zvkFulz.exe wermgr.exe PID 584 wrote to memory of 920 584 zvkFulz.exe wermgr.exe PID 584 wrote to memory of 920 584 zvkFulz.exe wermgr.exe PID 584 wrote to memory of 920 584 zvkFulz.exe wermgr.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\1_4_3.xls1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\ProgramData\zvkFulz.exe"C:\ProgramData\zvkFulz.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe3⤵
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\zvkFulz.exeMD5
2849523aac862a70bf47efbe15a8ab24
SHA175e7493c0c4a4066cf8ffbc0d92a96d83b931d2f
SHA2564d64628eed702959333373de23ee160e7f3439fd1a9924ddbba1e05d59686cfe
SHA512e016b3b00bfe2e56866001a0c99ef4dd9a12ff7c951c51a7ecbe8c7e9d8b136594a0910298c851c62c3d482fd506da27bf13440d2697b2bacc2655fa791ff0c5
-
C:\ProgramData\zvkFulz.exeMD5
2849523aac862a70bf47efbe15a8ab24
SHA175e7493c0c4a4066cf8ffbc0d92a96d83b931d2f
SHA2564d64628eed702959333373de23ee160e7f3439fd1a9924ddbba1e05d59686cfe
SHA512e016b3b00bfe2e56866001a0c99ef4dd9a12ff7c951c51a7ecbe8c7e9d8b136594a0910298c851c62c3d482fd506da27bf13440d2697b2bacc2655fa791ff0c5
-
\ProgramData\zvkFulz.exeMD5
2849523aac862a70bf47efbe15a8ab24
SHA175e7493c0c4a4066cf8ffbc0d92a96d83b931d2f
SHA2564d64628eed702959333373de23ee160e7f3439fd1a9924ddbba1e05d59686cfe
SHA512e016b3b00bfe2e56866001a0c99ef4dd9a12ff7c951c51a7ecbe8c7e9d8b136594a0910298c851c62c3d482fd506da27bf13440d2697b2bacc2655fa791ff0c5
-
memory/584-4-0x0000000000000000-mapping.dmp
-
memory/584-6-0x0000000000350000-0x0000000000382000-memory.dmpFilesize
200KB
-
memory/584-7-0x00000000003C0000-0x00000000003EF000-memory.dmpFilesize
188KB
-
memory/920-8-0x0000000000000000-mapping.dmp
-
memory/1944-2-0x000007FEF5E90000-0x000007FEF610A000-memory.dmpFilesize
2.5MB