Resubmissions
04-03-2021 08:52
210304-j75tzr3r6n 804-03-2021 08:48
210304-m8yqkl1awa 804-03-2021 08:46
210304-bb9saj67xx 804-03-2021 08:07
210304-s65gytp48n 804-03-2021 08:00
210304-s4fe9phywa 804-03-2021 07:58
210304-7fges7mren 801-03-2021 22:43
210301-7y8wr7t7jj 801-03-2021 22:40
210301-nyl6dpb96e 801-03-2021 21:40
210301-qmk2grykva 1001-03-2021 16:58
210301-2aqemcsxcn 8Analysis
-
max time kernel
59s -
max time network
27s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-03-2021 08:52
Behavioral task
behavioral1
Sample
39831.xls
Resource
win7v20201028
Behavioral task
behavioral2
Sample
39831.xls
Resource
win10v20201028
General
-
Target
39831.xls
-
Size
58KB
-
MD5
b5487815da8e8e15cfa3d2946f4b7132
-
SHA1
3278e15e1761100b6e9bb98b2351594aebd3805d
-
SHA256
409c0fdd23e87d2181aed6a283d83cdeaa1b7fbb685df01b5358febb0d09c8b8
-
SHA512
8f70813984c0e10b37cc6f256d30dbc9648a07124e0771ba8d701f2eb3457fa57a19105ace52adb3b9e32ee9aaf6272e6fea32c00b1374fb54e1c984832d22c0
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1724 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
Processes:
taskmgr.exepid process 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
taskmgr.exepid process 1716 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
taskmgr.exedescription pid process Token: SeDebugPrivilege 1716 taskmgr.exe -
Suspicious use of FindShellTrayWindow 46 IoCs
Processes:
EXCEL.EXEtaskmgr.exepid process 1724 EXCEL.EXE 1724 EXCEL.EXE 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe -
Suspicious use of SendNotifyMessage 44 IoCs
Processes:
taskmgr.exepid process 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe 1716 taskmgr.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEpid process 1724 EXCEL.EXE 1724 EXCEL.EXE 1724 EXCEL.EXE 1724 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
cmd.exedescription pid process target process PID 2016 wrote to memory of 1544 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 1544 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 1544 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 308 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 308 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 308 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 1556 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 1556 2016 cmd.exe zmstage.exe PID 2016 wrote to memory of 1556 2016 cmd.exe zmstage.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\39831.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
-
C:\Windows\system32\verclsid.exe"C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x4011⤵
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\087623607\zmstage.exezmstage.exe2⤵
-
C:\Users\Admin\AppData\Local\Temp\087623607\zmstage.exezmstage.exe /?2⤵
-
C:\Users\Admin\AppData\Local\Temp\087623607\zmstage.exezmstage.exe2⤵
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/308-10-0x0000000000000000-mapping.dmp
-
memory/308-13-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/308-12-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1376-5-0x000007FEFC601000-0x000007FEFC603000-memory.dmpFilesize
8KB
-
memory/1544-6-0x0000000000000000-mapping.dmp
-
memory/1544-7-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1544-8-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1544-9-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1556-14-0x0000000000000000-mapping.dmp
-
memory/1556-16-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1556-17-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/1716-19-0x0000000002B80000-0x0000000002B81000-memory.dmpFilesize
4KB
-
memory/1724-2-0x000000002F261000-0x000000002F264000-memory.dmpFilesize
12KB
-
memory/1724-4-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1724-3-0x0000000071C61000-0x0000000071C63000-memory.dmpFilesize
8KB