Analysis
-
max time kernel
96s -
max time network
17s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-03-2021 07:45
Behavioral task
behavioral1
Sample
subscription_1616715716.xlsb
Resource
win7v20201028
General
-
Target
subscription_1616715716.xlsb
Malware Config
Extracted
Signatures
-
Bazar Loader
Detected loader normally used to deploy BazarBackdoor malware.
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1084 1888 cmd.exe EXCEL.EXE -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Public\12394.fl5 acprotect \Users\Public\12394.fl5 acprotect -
Bazar/Team9 Loader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/804-20-0x0000000002630000-0x0000000002682000-memory.dmp BazarLoaderVar5 behavioral1/memory/804-21-0x0000000180000000-0x0000000180053000-memory.dmp BazarLoaderVar5 behavioral1/memory/804-22-0x0000000000360000-0x00000000003B0000-memory.dmp BazarLoaderVar5 -
Nloader Payload 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1100-14-0x0000000010000000-0x0000000010005000-memory.dmp nloader -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 1100 rundll32.exe 4 1100 rundll32.exe -
Executes dropped EXE 2 IoCs
Processes:
dwug.exedwug.exepid process 804 dwug.exe 1920 dwug.exe -
Processes:
resource yara_rule C:\Users\Public\12394.fl5 upx \Users\Public\12394.fl5 upx -
Loads dropped DLL 3 IoCs
Processes:
rundll32.exepid process 1100 rundll32.exe 1100 rundll32.exe 1100 rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1888 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
EXCEL.EXEdwug.exedwug.exepid process 1888 EXCEL.EXE 1888 EXCEL.EXE 1888 EXCEL.EXE 804 dwug.exe 1920 dwug.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
EXCEL.EXEcmd.exerundll32.exedwug.exedescription pid process target process PID 1888 wrote to memory of 1084 1888 EXCEL.EXE cmd.exe PID 1888 wrote to memory of 1084 1888 EXCEL.EXE cmd.exe PID 1888 wrote to memory of 1084 1888 EXCEL.EXE cmd.exe PID 1888 wrote to memory of 1084 1888 EXCEL.EXE cmd.exe PID 1084 wrote to memory of 392 1084 cmd.exe certutil.exe PID 1084 wrote to memory of 392 1084 cmd.exe certutil.exe PID 1084 wrote to memory of 392 1084 cmd.exe certutil.exe PID 1084 wrote to memory of 392 1084 cmd.exe certutil.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1084 wrote to memory of 1100 1084 cmd.exe rundll32.exe PID 1100 wrote to memory of 804 1100 rundll32.exe dwug.exe PID 1100 wrote to memory of 804 1100 rundll32.exe dwug.exe PID 1100 wrote to memory of 804 1100 rundll32.exe dwug.exe PID 1100 wrote to memory of 804 1100 rundll32.exe dwug.exe PID 804 wrote to memory of 1920 804 dwug.exe dwug.exe PID 804 wrote to memory of 1920 804 dwug.exe dwug.exe PID 804 wrote to memory of 1920 804 dwug.exe dwug.exe PID 804 wrote to memory of 1920 804 dwug.exe dwug.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\subscription_1616715716.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\cmd.execmd.exe /c certutil -decode %PUBLIC%\12394.xps %PUBLIC%\12394.fl5 && rundll32 %PUBLIC%\12394.fl5,DF12⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\certutil.execertutil -decode C:\Users\Public\12394.xps C:\Users\Public\12394.fl53⤵PID:392
-
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\12394.fl5,DF13⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\ProgramData\dwug\dwug.exe"C:\ProgramData\dwug\dwug.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\ProgramData\dwug\dwug.exe"C:\ProgramData\dwug\dwug.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
b5cb5ac79b76d8db06f631e4ab461074
SHA164c711c1b2d2297a17a548778f8bfa3ed7fae232
SHA256d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
SHA51203ba6e92c1ca88071a8b9f41e9f102df05a261af2507c4b19d7705509e259e3d51d05418cb42c7252bf6d9313ede86a1035e83ea421c8abda1ca865ba3f4d649
-
MD5
b5cb5ac79b76d8db06f631e4ab461074
SHA164c711c1b2d2297a17a548778f8bfa3ed7fae232
SHA256d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
SHA51203ba6e92c1ca88071a8b9f41e9f102df05a261af2507c4b19d7705509e259e3d51d05418cb42c7252bf6d9313ede86a1035e83ea421c8abda1ca865ba3f4d649
-
MD5
b5cb5ac79b76d8db06f631e4ab461074
SHA164c711c1b2d2297a17a548778f8bfa3ed7fae232
SHA256d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
SHA51203ba6e92c1ca88071a8b9f41e9f102df05a261af2507c4b19d7705509e259e3d51d05418cb42c7252bf6d9313ede86a1035e83ea421c8abda1ca865ba3f4d649
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3825035466-2522850611-591511364-1000\0f5007522459c86e95ffcc62f32308f1_fc0e0041-a258-4d5d-ad46-ed56e156a8eb
MD5f6a96c2e6f6d4c3b128da6d7b835783e
SHA12acb8fe085a14d38c166ac3f2151623ffb796efd
SHA2567b616dc4a6fb6c0ae913d2a259a4f044508680a2e3a722bfed8551905171a749
SHA51204c2f562b48197f987a68e48644ea425acfb8a1ecca4c72e088dbfb47e2e0680ea7574d0c617725dc1bce794c50f7ace16689db1ad564cafa6f4d06e51843cb7
-
MD5
5e61a7988375efe18897ff264b7c81b8
SHA18a487c189edd6e3cc32cee7709aa4e0c21d07491
SHA2567aa4cb052ddfbccac10bdfeae585f15fa4bfbeadea5ece649234fcbc9fec2955
SHA51214e3a48cad4e4d5ba848a793fd304dec5416a6652394241db91d7d029b205e252bf3d3c77dafe4a587a4748d6a558ba7ec3d417d211b6f58fc00b794ed7eb788
-
MD5
8bd77cfc1367b015ae4b41271ef0f917
SHA1d406dd185e1d2eb7a40d41818202a3e37192dc93
SHA25627f6411f25ea347e2a6ad3a220f4be92fa57ed09bcc7f3098376dc9d12586b08
SHA51258de781827db0cdd6ed4f1f11c02be1babc19787c0d79a4fae9ecb5a93c84fdb8bb239e7b2e90248b6f8d81213326aef535244024485b7bd46da61bd7f82c018
-
MD5
b5cb5ac79b76d8db06f631e4ab461074
SHA164c711c1b2d2297a17a548778f8bfa3ed7fae232
SHA256d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
SHA51203ba6e92c1ca88071a8b9f41e9f102df05a261af2507c4b19d7705509e259e3d51d05418cb42c7252bf6d9313ede86a1035e83ea421c8abda1ca865ba3f4d649
-
MD5
b5cb5ac79b76d8db06f631e4ab461074
SHA164c711c1b2d2297a17a548778f8bfa3ed7fae232
SHA256d3fa691696a8909efdd54e5cd4bb8310aaa72a5b3a7628700e3404494214bda9
SHA51203ba6e92c1ca88071a8b9f41e9f102df05a261af2507c4b19d7705509e259e3d51d05418cb42c7252bf6d9313ede86a1035e83ea421c8abda1ca865ba3f4d649
-
MD5
5e61a7988375efe18897ff264b7c81b8
SHA18a487c189edd6e3cc32cee7709aa4e0c21d07491
SHA2567aa4cb052ddfbccac10bdfeae585f15fa4bfbeadea5ece649234fcbc9fec2955
SHA51214e3a48cad4e4d5ba848a793fd304dec5416a6652394241db91d7d029b205e252bf3d3c77dafe4a587a4748d6a558ba7ec3d417d211b6f58fc00b794ed7eb788