Analysis
-
max time kernel
138s -
max time network
134s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
11-12-2020 07:13
Static task
static1
Behavioral task
behavioral1
Sample
Notice-Delivery2020.xlsm
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Notice-Delivery2020.xlsm
-
Size
430KB
-
MD5
0b49c3bd2479bed644ee5f0a21bdeabb
-
SHA1
2f63381e01e5c6c2dd0b2759a645c7aae6019a49
-
SHA256
711a05c2b42db93458407fc8d81cdd8d5c92a5cf44e5cab4e9ca58f5267d3cab
-
SHA512
9d3b2e7d253b18a3cdcd05f908c8826e33401bb34ece07d42f0ee0f53b5f9d1a66f85459990bdf43401a8970e9d4cbe5c482f2578fcbec9994dbebaacb95a459
Malware Config
Extracted
Family
buer
C2
heartprogseds.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/1592-7-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/1592-8-0x0000000040005DA8-mapping.dmp buer behavioral2/memory/1592-10-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Executes dropped EXE 2 IoCs
pid Process 3012 MSettingExcel.exe 1592 MSettingExcel.exe -
Loads dropped DLL 1 IoCs
pid Process 3012 MSettingExcel.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3012 set thread context of 1592 3012 MSettingExcel.exe 80 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x0002000000015614-4.dat nsis_installer_1 behavioral2/files/0x0002000000015614-4.dat nsis_installer_2 behavioral2/files/0x0002000000015614-5.dat nsis_installer_1 behavioral2/files/0x0002000000015614-5.dat nsis_installer_2 behavioral2/files/0x0002000000015614-9.dat nsis_installer_1 behavioral2/files/0x0002000000015614-9.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1924 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3012 MSettingExcel.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE 1924 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3012 1924 EXCEL.EXE 76 PID 1924 wrote to memory of 3012 1924 EXCEL.EXE 76 PID 1924 wrote to memory of 3012 1924 EXCEL.EXE 76 PID 3012 wrote to memory of 1592 3012 MSettingExcel.exe 80 PID 3012 wrote to memory of 1592 3012 MSettingExcel.exe 80 PID 3012 wrote to memory of 1592 3012 MSettingExcel.exe 80 PID 3012 wrote to memory of 1592 3012 MSettingExcel.exe 80
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Notice-Delivery2020.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\offic\offiekra\MSettingExcel.exe"C:\offic\offiekra\MSettingExcel.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\offic\offiekra\MSettingExcel.exe"C:\offic\offiekra\MSettingExcel.exe"3⤵
- Executes dropped EXE
PID:1592
-
-