Analysis
-
max time kernel
103s -
max time network
119s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
03-02-2021 07:13
Behavioral task
behavioral1
Sample
Invoice267782.xls
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
Invoice267782.xls
-
Size
254KB
-
MD5
7e15415b138af90c8388aa309276ef7e
-
SHA1
23aba1aaf9d35894333fe29c86f76a236f602bdd
-
SHA256
5fdb1b3df88e49123804cb3cbdfee96b1e29371ca7ac6f27e3c57228a563aa10
-
SHA512
a275f4292dde13441d9dab4bd48b1acd9e88f7b1fbabd55dd33bced1f085d9b6d1b79121edda8fb99f8ae05d184d3e94940d14a4da6156094ead4620a1e12ea6
Malware Config
Extracted
Family
buer
C2
webgraitupeople.com
Signatures
-
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/1632-13-0x0000000040000000-0x000000004000A000-memory.dmp buer -
Executes dropped EXE 2 IoCs
pid Process 3796 scpload.exe 1632 scpload.exe -
Loads dropped DLL 1 IoCs
pid Process 3796 scpload.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3796 set thread context of 1632 3796 scpload.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 8 IoCs
resource yara_rule nsis_installer_1 nsis_installer_2 behavioral2/files/0x0002000000015660-8.dat nsis_installer_1 behavioral2/files/0x0002000000015660-8.dat nsis_installer_2 behavioral2/files/0x0002000000015660-9.dat nsis_installer_1 behavioral2/files/0x0002000000015660-9.dat nsis_installer_2 behavioral2/files/0x0002000000015660-12.dat nsis_installer_1 behavioral2/files/0x0002000000015660-12.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1212 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 3796 scpload.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE 1212 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1212 wrote to memory of 3796 1212 EXCEL.EXE 83 PID 1212 wrote to memory of 3796 1212 EXCEL.EXE 83 PID 1212 wrote to memory of 3796 1212 EXCEL.EXE 83 PID 3796 wrote to memory of 1632 3796 scpload.exe 84 PID 3796 wrote to memory of 1632 3796 scpload.exe 84 PID 3796 wrote to memory of 1632 3796 scpload.exe 84 PID 3796 wrote to memory of 1632 3796 scpload.exe 84
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice267782.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\jobtitle\spaceodk\scpload.exe"C:\jobtitle\spaceodk\scpload.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\jobtitle\spaceodk\scpload.exe"C:\jobtitle\spaceodk\scpload.exe"3⤵
- Executes dropped EXE
PID:1632
-
-