Resubmissions
18-03-2021 05:00
210318-qavf9s8tea 10Analysis
-
max time kernel
69s -
max time network
134s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
18-03-2021 05:00
Behavioral task
behavioral1
Sample
Form_1004276.xlsb
Resource
win7v20201028
General
-
Target
Form_1004276.xlsb
-
Size
277KB
-
MD5
830ee920796185f6ef36dc8962ce8cb8
-
SHA1
89ee9b135716f6aca200d268bf270d28e29d21d7
-
SHA256
bd4f4450e7d4973ed38cc12cbe6689eb63ff492fb0cc9e6f56144ffe4474aa58
-
SHA512
a74ceabb94c3157970f5396a98f074faf1951ed1111c17d52f00c046cce1b1117c3b6498c33a82756f607b5bac1660246a30bdaa2887e43e881e26c5589ffcde
Malware Config
Extracted
Extracted
trickbot
100013
rev3
103.225.138.94:449
122.2.28.70:449
123.200.26.246:449
131.255.106.152:449
142.112.79.223:449
154.126.176.30:449
180.92.238.186:449
187.20.217.129:449
201.20.118.122:449
202.91.41.138:449
95.210.118.90:449
-
autorunName:pwgrab
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1788 1724 certutil.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 416 1724 rundll32.exe 24 -
Nloader Payload 4 IoCs
resource yara_rule behavioral1/memory/416-14-0x0000000010000000-0x0000000010007000-memory.dmp nloader behavioral1/memory/416-13-0x0000000000140000-0x0000000000149000-memory.dmp nloader behavioral1/memory/416-15-0x00000000001E0000-0x00000000001E5000-memory.dmp nloader behavioral1/memory/416-16-0x0000000000130000-0x0000000000136000-memory.dmp nloader -
Templ.dll packer 3 IoCs
Detects Templ.dll packer which usually loads Trickbot.
resource yara_rule behavioral1/memory/928-25-0x0000000000240000-0x0000000000279000-memory.dmp templ_dll behavioral1/memory/928-26-0x00000000002E0000-0x0000000000317000-memory.dmp templ_dll behavioral1/memory/928-28-0x00000000001A0000-0x00000000001D6000-memory.dmp templ_dll -
Blocklisted process makes network request 2 IoCs
flow pid Process 3 416 rundll32.exe 4 416 rundll32.exe -
Loads dropped DLL 5 IoCs
pid Process 416 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe 928 rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1724 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1432 wermgr.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1724 EXCEL.EXE 1724 EXCEL.EXE 1724 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 1724 wrote to memory of 1788 1724 EXCEL.EXE 27 PID 1724 wrote to memory of 1788 1724 EXCEL.EXE 27 PID 1724 wrote to memory of 1788 1724 EXCEL.EXE 27 PID 1724 wrote to memory of 1788 1724 EXCEL.EXE 27 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 1724 wrote to memory of 416 1724 EXCEL.EXE 32 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 416 wrote to memory of 928 416 rundll32.exe 34 PID 928 wrote to memory of 1804 928 rundll32.exe 35 PID 928 wrote to memory of 1804 928 rundll32.exe 35 PID 928 wrote to memory of 1804 928 rundll32.exe 35 PID 928 wrote to memory of 1804 928 rundll32.exe 35 PID 928 wrote to memory of 1432 928 rundll32.exe 36 PID 928 wrote to memory of 1432 928 rundll32.exe 36 PID 928 wrote to memory of 1432 928 rundll32.exe 36 PID 928 wrote to memory of 1432 928 rundll32.exe 36 PID 928 wrote to memory of 1432 928 rundll32.exe 36 PID 928 wrote to memory of 1432 928 rundll32.exe 36
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Form_1004276.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\certutil.exe"C:\Windows\System32\certutil.exe" -decode C:\Users\Public\jahi.png C:\Users\Public\jahi.pn2⤵
- Process spawned unexpected child process
PID:1788
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Users\Public\jahi.pn,DF2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:416 -
C:\Windows\SysWOW64\rundll32.exeC:\ProgramData\kgff\kgff.dll,DllRegisterServer13⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:928 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe4⤵PID:1804
-
-
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:1432
-
-
-