Analysis
-
max time kernel
118s -
max time network
101s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
17-12-2020 17:26
Static task
static1
Behavioral task
behavioral1
Sample
Order-13822.xls
Resource
win7v20201028
General
-
Target
Order-13822.xls
-
Size
111KB
-
MD5
ee70031efbe62f81aa3c434ae0636a09
-
SHA1
a9ebd7146771b922cb9a21456566fce7e93919c0
-
SHA256
147679b401d295a5300cde9e2ad39a1a2b5a09757c1a248dd53914bdb9678140
-
SHA512
9f3dfee086cf585601002d449613c34295e5e5fdad29bd41750e96011c2073d8e923109ebdf490d52b3c658174f3b7e0f6f2f47f5a64e63a40ded6d30b84adc4
Malware Config
Extracted
https://reinin.tw/wp-keys.php
https://legendcoder.com/wp-keys.php
https://pullingmezcnarcmer.tk/wp-keys.php
https://ruibrunconcallconsta.tk/wp-keys.php
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
explorer.exerundll32.exedescription pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1344 648 explorer.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1724 648 rundll32.exe 24 -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 648 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
EXCEL.EXEpid Process 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE 648 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
EXCEL.EXEexplorer.exedescription pid Process procid_target PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 648 wrote to memory of 1344 648 EXCEL.EXE 26 PID 1152 wrote to memory of 1760 1152 explorer.exe 28 PID 1152 wrote to memory of 1760 1152 explorer.exe 28 PID 1152 wrote to memory of 1760 1152 explorer.exe 28 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34 PID 648 wrote to memory of 1724 648 EXCEL.EXE 34
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Order-13822.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe C:\Users\Public\AAl35.vbs2⤵
- Process spawned unexpected child process
PID:1344
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Users\Public\XpOK.html,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:1724
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Public\AAl35.vbs"2⤵PID:1760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
1a5c032d53abe34e6be7a9fa01507716
SHA183eb51a3751894f57bf4b11e1039de26283aa1e0
SHA25656858fd77b39862d5e7b163434a81a0eafed342bc86d048c9756e65de5fb876e
SHA5128b53f8e845ce8aa8135ed8c97eb7ee17996a0a1752cd5acb70f05fca07177e9623acf3f882c8e72395c86a3964362aa2f6b1550b1d46a3b59353f819ab65792d
-
MD5
21438ef4b9ad4fc266b6129a2f60de29
SHA15eb8e2242eeb4f5432beeec8b873f1ab0a6b71fd
SHA25613bf7b3039c63bf5a50491fa3cfd8eb4e699d1ba1436315aef9cbe5711530354
SHA51237436ced85e5cd638973e716d6713257d692f9dd2e1975d5511ae3856a7b3b9f0d9e497315a058b516ab31d652ea9950938c77c1ad435ea8d4b49d73427d1237