Analysis
-
max time kernel
118s -
max time network
101s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17/12/2020, 17:26
Static task
static1
Behavioral task
behavioral1
Sample
Order-13822.xls
Resource
win7v20201028
0 signatures
0 seconds
General
-
Target
Order-13822.xls
-
Size
111KB
-
MD5
ee70031efbe62f81aa3c434ae0636a09
-
SHA1
a9ebd7146771b922cb9a21456566fce7e93919c0
-
SHA256
147679b401d295a5300cde9e2ad39a1a2b5a09757c1a248dd53914bdb9678140
-
SHA512
9f3dfee086cf585601002d449613c34295e5e5fdad29bd41750e96011c2073d8e923109ebdf490d52b3c658174f3b7e0f6f2f47f5a64e63a40ded6d30b84adc4
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
https://reinin.tw/wp-keys.php
xlm40.dropper
https://legendcoder.com/wp-keys.php
xlm40.dropper
https://pullingmezcnarcmer.tk/wp-keys.php
xlm40.dropper
https://ruibrunconcallconsta.tk/wp-keys.php
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1344 648 explorer.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1724 648 rundll32.exe 24 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 648 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 1152 wrote to memory of 1760 1152 explorer.exe 28 PID 1152 wrote to memory of 1760 1152 explorer.exe 28 PID 1152 wrote to memory of 1760 1152 explorer.exe 28 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Order-13822.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Public\AAl35.vbs2⤵
- Process spawned unexpected child process
PID:1344
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Public\XpOK.html,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:1724
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\AAl35.vbs"2⤵PID:1760
-