Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
02-03-2021 20:49
Static task
static1
Behavioral task
behavioral1
Sample
Invoice_8003346.xlsm
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Malware Config
Extracted
Family
buer
C2
verstudiosan.com
Signatures
-
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral2/memory/3856-14-0x0000000040000000-0x0000000040009000-memory.dmp buer -
Executes dropped EXE 2 IoCs
pid Process 2164 ServApi.exe 3856 ServApi.exe -
Loads dropped DLL 1 IoCs
pid Process 2164 ServApi.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2164 set thread context of 3856 2164 ServApi.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
resource yara_rule behavioral2/files/0x0003000000015641-9.dat nsis_installer_1 behavioral2/files/0x0003000000015641-9.dat nsis_installer_2 behavioral2/files/0x0003000000015641-10.dat nsis_installer_1 behavioral2/files/0x0003000000015641-10.dat nsis_installer_2 behavioral2/files/0x0003000000015641-13.dat nsis_installer_1 behavioral2/files/0x0003000000015641-13.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1056 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2164 ServApi.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE 1056 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1056 wrote to memory of 2164 1056 EXCEL.EXE 81 PID 1056 wrote to memory of 2164 1056 EXCEL.EXE 81 PID 1056 wrote to memory of 2164 1056 EXCEL.EXE 81 PID 2164 wrote to memory of 3856 2164 ServApi.exe 85 PID 2164 wrote to memory of 3856 2164 ServApi.exe 85 PID 2164 wrote to memory of 3856 2164 ServApi.exe 85 PID 2164 wrote to memory of 3856 2164 ServApi.exe 85
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice_8003346.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\dswekerjs\dljffsrd\ServApi.exe"C:\dswekerjs\dljffsrd\ServApi.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\dswekerjs\dljffsrd\ServApi.exe"C:\dswekerjs\dljffsrd\ServApi.exe"3⤵
- Executes dropped EXE
PID:3856
-
-