Analysis
-
max time kernel
69s -
max time network
43s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
28-01-2021 18:56
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.8959.26365.55.xls
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Exploit.Siggen3.8959.26365.55.xls
-
Size
386KB
-
MD5
d16f23f1d5b520fa2407793e2318bbec
-
SHA1
58d25900741a1a1fc5e8617322eab6957c520c44
-
SHA256
cf4c2af3c3e4ec4658c9ee98da829643c85071dec8b91085af1c2ee2811d406a
-
SHA512
93cc56319363704a325703ec512643ad15041def3abed5e56f1029d9658d63ee03444ef6e5c59654ce91f97551366fceca6b0d34c53fd78f9c726b69217a4c4c
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
http://213.252.244.225/font.tiff
Extracted
Family
buer
C2
jerryskaxtebilling.com
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/572-11-0x00000000001B0000-0x00000000001B8000-memory.dmp buer behavioral1/memory/572-12-0x0000000040000000-0x000000004000A000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 572 printeditor.exe -
Loads dropped DLL 2 IoCs
pid Process 1684 EXCEL.EXE 1684 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1684 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1684 EXCEL.EXE 1684 EXCEL.EXE 1684 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1684 wrote to memory of 572 1684 EXCEL.EXE 31 PID 1684 wrote to memory of 572 1684 EXCEL.EXE 31 PID 1684 wrote to memory of 572 1684 EXCEL.EXE 31 PID 1684 wrote to memory of 572 1684 EXCEL.EXE 31
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Siggen3.8959.26365.55.xls1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Corporate\globfgef\printeditor.exe"C:\Corporate\globfgef\printeditor.exe"2⤵
- Executes dropped EXE
PID:572
-