Analysis
-
max time kernel
135s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-12-2020 15:52
Static task
static1
Behavioral task
behavioral1
Sample
Invoice.xlsb
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Invoice.xlsb
-
Size
155KB
-
MD5
18cb83fa82fb14788d5a1cbafcd9bb28
-
SHA1
4b61151831eedeb225166c30c2e2b555c9e5b5d0
-
SHA256
45cc417aeb30d7aaba675077c10f70d66ee9b1b8b4820f0469221f0a87fe9545
-
SHA512
123acdaeb7baeb1bfe5284a70d920f692ff97927fe05cbbf56b029c93684aea5429c7e619a8a3ea2e55136d8398777f0e0b134cfe27e61b92acda0acf3ec5b4e
Malware Config
Extracted
Family
buer
C2
softwareconsbank.com
Signatures
-
Buer Loader 3 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/4436-7-0x0000000040000000-0x0000000040009000-memory.dmp buer behavioral2/memory/4436-8-0x0000000040005DA8-mapping.dmp buer behavioral2/memory/4436-10-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Executes dropped EXE 2 IoCs
pid Process 3936 spoolv.exe 4436 spoolv.exe -
Loads dropped DLL 1 IoCs
pid Process 3936 spoolv.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3936 set thread context of 4436 3936 spoolv.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x0006000000015600-4.dat nsis_installer_1 behavioral2/files/0x0006000000015600-4.dat nsis_installer_2 behavioral2/files/0x0006000000015600-5.dat nsis_installer_1 behavioral2/files/0x0006000000015600-5.dat nsis_installer_2 behavioral2/files/0x0006000000015600-9.dat nsis_installer_1 behavioral2/files/0x0006000000015600-9.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4644 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3936 spoolv.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4644 EXCEL.EXE 4644 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE 4644 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 4644 wrote to memory of 3936 4644 EXCEL.EXE 76 PID 4644 wrote to memory of 3936 4644 EXCEL.EXE 76 PID 4644 wrote to memory of 3936 4644 EXCEL.EXE 76 PID 3936 wrote to memory of 4436 3936 spoolv.exe 81 PID 3936 wrote to memory of 4436 3936 spoolv.exe 81 PID 3936 wrote to memory of 4436 3936 spoolv.exe 81 PID 3936 wrote to memory of 4436 3936 spoolv.exe 81
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\GSEER\GefeDFpa\spoolv.exe"C:\GSEER\GefeDFpa\spoolv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\GSEER\GefeDFpa\spoolv.exe"C:\GSEER\GefeDFpa\spoolv.exe"3⤵
- Executes dropped EXE
PID:4436
-
-