Analysis
-
max time kernel
118s -
max time network
117s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
19-03-2021 15:42
Behavioral task
behavioral1
Sample
subscription_1616167805.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
subscription_1616167805.xlsb
Resource
win10v20201028
General
-
Target
subscription_1616167805.xlsb
-
Size
328KB
-
MD5
d17e780a23c19a5ce5c2a0d4abc19b55
-
SHA1
d3d73e9f08cb6d880dc163149d352a197dac7300
-
SHA256
056809e596895320397378f7f3ff4958107e48f4890a960229dcfbc32b7379b7
-
SHA512
df94d5473166e9d73ee27a37793fa3bbdee409692cee61696b3dd7bf79c3604da14a09a7e27becf17fd59ab267fd8f6548026b7d5da232253800f0ee94602cab
Malware Config
Extracted
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1792 2044 cmd.exe EXCEL.EXE -
Nloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/748-14-0x0000000000130000-0x0000000000139000-memory.dmp nloader behavioral1/memory/748-15-0x0000000010000000-0x0000000010007000-memory.dmp nloader behavioral1/memory/748-16-0x0000000000150000-0x0000000000155000-memory.dmp nloader behavioral1/memory/748-17-0x0000000000120000-0x0000000000126000-memory.dmp nloader -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 748 rundll32.exe 5 748 rundll32.exe -
Executes dropped EXE 1 IoCs
Processes:
klga.exepid process 696 klga.exe -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exepid process 748 rundll32.exe 748 rundll32.exe 748 rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2044 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 2044 EXCEL.EXE 2044 EXCEL.EXE 2044 EXCEL.EXE -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
EXCEL.EXEcmd.exerundll32.exedescription pid process target process PID 2044 wrote to memory of 1792 2044 EXCEL.EXE cmd.exe PID 2044 wrote to memory of 1792 2044 EXCEL.EXE cmd.exe PID 2044 wrote to memory of 1792 2044 EXCEL.EXE cmd.exe PID 2044 wrote to memory of 1792 2044 EXCEL.EXE cmd.exe PID 1792 wrote to memory of 1768 1792 cmd.exe certutil.exe PID 1792 wrote to memory of 1768 1792 cmd.exe certutil.exe PID 1792 wrote to memory of 1768 1792 cmd.exe certutil.exe PID 1792 wrote to memory of 1768 1792 cmd.exe certutil.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 1792 wrote to memory of 748 1792 cmd.exe rundll32.exe PID 748 wrote to memory of 696 748 rundll32.exe klga.exe PID 748 wrote to memory of 696 748 rundll32.exe klga.exe PID 748 wrote to memory of 696 748 rundll32.exe klga.exe PID 748 wrote to memory of 696 748 rundll32.exe klga.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\subscription_1616167805.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c certutil -f -decode C:\Users\Public\1171.d0 C:\Users\Public\1171.0 && rundll32 C:\Users\Public\1171.0,DF2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\certutil.execertutil -f -decode C:\Users\Public\1171.d0 C:\Users\Public\1171.03⤵PID:1768
-
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\1171.0,DF3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\ProgramData\klga\klga.exe"C:\ProgramData\klga\klga.exe"4⤵
- Executes dropped EXE
PID:696
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
3b741d6798735efdae2d18c80716ee4b
SHA197628ead21544a7b7a065df10c2829207b5c4911
SHA25664bb301a1ef092d05ce99b282df5d6967b01a4598c292d14608137a180ecaece
SHA5120cb4d710481cfd3cd918bc8d3ca88462fdea88330dbfebb0fabc5e6bc8f03562f08d2b8cf3499af721eceba667458b724a61fbc16729dbf531cf3dfe10d33ca1
-
MD5
480db4035b4be0d96a43f44b77947b9c
SHA1de066e080a64b61325f747f1e021df07caeabc0b
SHA256c63683a48bafacd5adf8814244142263f3b1033d053d50b93cc1f479b7dba98c
SHA51281c310ca460348451a69ae4f3bf1dd2b720a772399e9f2dee5232a9df77798a06518f265087f9cd84d772ebb700799cd29f312d1d8eedf871bb0d630fb19e39a
-
MD5
ce3590b97179ba87c9c71ae51378949a
SHA1a435d40dc12fd837c5433eb4543d2b27200aa745
SHA25667d178a28e2defbe4bfd95d38643b0ad6e35ef5597e97934bf93ca905968b0be
SHA5127f263d15f13b1a4fd5e4ec272a86bbe5ba9972545fa25fb505eff4f875d0fe697a6acc5adaf25d3ec560771b56efe536d88edcced76ad74e3fcd3fc0c9ccef58
-
MD5
3b741d6798735efdae2d18c80716ee4b
SHA197628ead21544a7b7a065df10c2829207b5c4911
SHA25664bb301a1ef092d05ce99b282df5d6967b01a4598c292d14608137a180ecaece
SHA5120cb4d710481cfd3cd918bc8d3ca88462fdea88330dbfebb0fabc5e6bc8f03562f08d2b8cf3499af721eceba667458b724a61fbc16729dbf531cf3dfe10d33ca1
-
MD5
3b741d6798735efdae2d18c80716ee4b
SHA197628ead21544a7b7a065df10c2829207b5c4911
SHA25664bb301a1ef092d05ce99b282df5d6967b01a4598c292d14608137a180ecaece
SHA5120cb4d710481cfd3cd918bc8d3ca88462fdea88330dbfebb0fabc5e6bc8f03562f08d2b8cf3499af721eceba667458b724a61fbc16729dbf531cf3dfe10d33ca1
-
MD5
480db4035b4be0d96a43f44b77947b9c
SHA1de066e080a64b61325f747f1e021df07caeabc0b
SHA256c63683a48bafacd5adf8814244142263f3b1033d053d50b93cc1f479b7dba98c
SHA51281c310ca460348451a69ae4f3bf1dd2b720a772399e9f2dee5232a9df77798a06518f265087f9cd84d772ebb700799cd29f312d1d8eedf871bb0d630fb19e39a