Analysis
-
max time kernel
136s -
max time network
133s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
28-01-2021 18:56
Behavioral task
behavioral1
Sample
SecuriteInfo.com.Exploit.Siggen3.8959.26365.55.xls
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
SecuriteInfo.com.Exploit.Siggen3.8959.26365.55.xls
-
Size
386KB
-
MD5
d16f23f1d5b520fa2407793e2318bbec
-
SHA1
58d25900741a1a1fc5e8617322eab6957c520c44
-
SHA256
cf4c2af3c3e4ec4658c9ee98da829643c85071dec8b91085af1c2ee2811d406a
-
SHA512
93cc56319363704a325703ec512643ad15041def3abed5e56f1029d9658d63ee03444ef6e5c59654ce91f97551366fceca6b0d34c53fd78f9c726b69217a4c4c
Malware Config
Extracted
Family
buer
C2
jerryskaxtebilling.com
Signatures
-
Buer Loader 2 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/3156-12-0x0000000040000000-0x000000004000A000-memory.dmp buer behavioral2/memory/3156-11-0x0000000000490000-0x0000000000498000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 3156 printeditor.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 984 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 984 EXCEL.EXE 984 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE 984 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 984 wrote to memory of 3156 984 EXCEL.EXE 75 PID 984 wrote to memory of 3156 984 EXCEL.EXE 75 PID 984 wrote to memory of 3156 984 EXCEL.EXE 75
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Exploit.Siggen3.8959.26365.55.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Corporate\globfgef\printeditor.exe"C:\Corporate\globfgef\printeditor.exe"2⤵
- Executes dropped EXE
PID:3156
-