Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
15-03-2021 13:33
Behavioral task
behavioral1
Sample
Documents118.xlsm
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Documents118.xlsm
Resource
win10v20201028
windows10_x64
0 signatures
0 seconds
General
-
Target
Documents118.xlsm
-
Size
57KB
-
MD5
9793c1a18272f2459fee69f8f914388f
-
SHA1
740aa60f77f9372bad6e533637ef9e812d1f9b44
-
SHA256
9ba472bd3fcd23bf1b820c9f35e33fd64c334c2e3b7189bf77bc0c080c449e56
-
SHA512
4fd053e65f414f20c3ef3f53169968f0766f63dea462b373b682734c32309a128a975609c636d7cf42350319d88e1c15c77f98041b25d9c65eb077560022edfa
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
http://xgka03stox03cloeqz.com/index.gif
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
wmic.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 552 2044 wmic.exe EXCEL.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1032 1920 regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2044 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
wmic.exedescription pid process Token: SeIncreaseQuotaPrivilege 552 wmic.exe Token: SeSecurityPrivilege 552 wmic.exe Token: SeTakeOwnershipPrivilege 552 wmic.exe Token: SeLoadDriverPrivilege 552 wmic.exe Token: SeSystemProfilePrivilege 552 wmic.exe Token: SeSystemtimePrivilege 552 wmic.exe Token: SeProfSingleProcessPrivilege 552 wmic.exe Token: SeIncBasePriorityPrivilege 552 wmic.exe Token: SeCreatePagefilePrivilege 552 wmic.exe Token: SeBackupPrivilege 552 wmic.exe Token: SeRestorePrivilege 552 wmic.exe Token: SeShutdownPrivilege 552 wmic.exe Token: SeDebugPrivilege 552 wmic.exe Token: SeSystemEnvironmentPrivilege 552 wmic.exe Token: SeRemoteShutdownPrivilege 552 wmic.exe Token: SeUndockPrivilege 552 wmic.exe Token: SeManageVolumePrivilege 552 wmic.exe Token: 33 552 wmic.exe Token: 34 552 wmic.exe Token: 35 552 wmic.exe Token: SeIncreaseQuotaPrivilege 552 wmic.exe Token: SeSecurityPrivilege 552 wmic.exe Token: SeTakeOwnershipPrivilege 552 wmic.exe Token: SeLoadDriverPrivilege 552 wmic.exe Token: SeSystemProfilePrivilege 552 wmic.exe Token: SeSystemtimePrivilege 552 wmic.exe Token: SeProfSingleProcessPrivilege 552 wmic.exe Token: SeIncBasePriorityPrivilege 552 wmic.exe Token: SeCreatePagefilePrivilege 552 wmic.exe Token: SeBackupPrivilege 552 wmic.exe Token: SeRestorePrivilege 552 wmic.exe Token: SeShutdownPrivilege 552 wmic.exe Token: SeDebugPrivilege 552 wmic.exe Token: SeSystemEnvironmentPrivilege 552 wmic.exe Token: SeRemoteShutdownPrivilege 552 wmic.exe Token: SeUndockPrivilege 552 wmic.exe Token: SeManageVolumePrivilege 552 wmic.exe Token: 33 552 wmic.exe Token: 34 552 wmic.exe Token: 35 552 wmic.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 2044 wrote to memory of 552 2044 EXCEL.EXE wmic.exe PID 2044 wrote to memory of 552 2044 EXCEL.EXE wmic.exe PID 2044 wrote to memory of 552 2044 EXCEL.EXE wmic.exe PID 2044 wrote to memory of 552 2044 EXCEL.EXE wmic.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Documents118.xlsm1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe process call create 'regsvr32 -s C:\Users\Public\microsoft.security'2⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\regsvr32.exeregsvr32 -s C:\Users\Public\microsoft.security1⤵
- Process spawned unexpected child process
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/552-6-0x0000000000000000-mapping.dmp
-
memory/1032-7-0x000007FEFC011000-0x000007FEFC013000-memory.dmpFilesize
8KB
-
memory/1968-5-0x000007FEF77C0000-0x000007FEF7A3A000-memory.dmpFilesize
2.5MB
-
memory/2044-2-0x000000002F461000-0x000000002F464000-memory.dmpFilesize
12KB
-
memory/2044-3-0x0000000071671000-0x0000000071673000-memory.dmpFilesize
8KB
-
memory/2044-4-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB