Analysis
-
max time kernel
148s -
max time network
21s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
29-03-2021 17:03
Behavioral task
behavioral1
Sample
subscription_1617037035.xlsb
Resource
win7v20201028
Behavioral task
behavioral2
Sample
subscription_1617037035.xlsb
Resource
win10v20201028
General
-
Target
subscription_1617037035.xlsb
-
Size
176KB
-
MD5
94dee992c9b32337944c537faad98fc3
-
SHA1
03028e9d85889ef3f6d7a202fa8b48d4f28189cc
-
SHA256
785cee1832087169cb5ea280304865f96fa3ca42d6af6b97acb0204837d6c4d6
-
SHA512
d47f9b88624e14a4f8b7cc0e1ad0aac7450d1699527f7997ec098e5ce023f2d713296cafa35aee4199dd1ef93236928454c9e60a342b4a0f70902833d85ac5fd
Malware Config
Extracted
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1540 1852 cmd.exe EXCEL.EXE -
Nloader Payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/1720-16-0x00000000001E0000-0x00000000001E5000-memory.dmp nloader behavioral1/memory/1720-15-0x00000000000D0000-0x00000000000D7000-memory.dmp nloader behavioral1/memory/1720-14-0x00000000000C0000-0x00000000000C9000-memory.dmp nloader behavioral1/memory/1720-17-0x00000000000B0000-0x00000000000B6000-memory.dmp nloader -
Blocklisted process makes network request 2 IoCs
Processes:
rundll32.exeflow pid process 3 1720 rundll32.exe 6 1720 rundll32.exe -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 1720 rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1852 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1852 EXCEL.EXE 1852 EXCEL.EXE 1852 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
EXCEL.EXEcmd.exedescription pid process target process PID 1852 wrote to memory of 1540 1852 EXCEL.EXE cmd.exe PID 1852 wrote to memory of 1540 1852 EXCEL.EXE cmd.exe PID 1852 wrote to memory of 1540 1852 EXCEL.EXE cmd.exe PID 1852 wrote to memory of 1540 1852 EXCEL.EXE cmd.exe PID 1540 wrote to memory of 1804 1540 cmd.exe certutil.exe PID 1540 wrote to memory of 1804 1540 cmd.exe certutil.exe PID 1540 wrote to memory of 1804 1540 cmd.exe certutil.exe PID 1540 wrote to memory of 1804 1540 cmd.exe certutil.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe PID 1540 wrote to memory of 1720 1540 cmd.exe rundll32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\subscription_1617037035.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd.exe /c certutil -decode %PUBLIC%\4123.xsg %PUBLIC%\4123.do1 && rundll32 %PUBLIC%\4123.do1,DF12⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\certutil.execertutil -decode C:\Users\Public\4123.xsg C:\Users\Public\4123.do13⤵PID:1804
-
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\4123.do1,DF13⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:1720
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
f776deb4df137b37dcae5406c8f3a07a
SHA1f6a31b594fca39c118927405fa4d14353b8fd49a
SHA25693cc5e6a6b671d9b0124ade32ae8b09269de9f03c5c5e66347fbfc7a8c3b305e
SHA5124077b4214b4683bb4776d470027e61fcc3cb3e78beb9377674e4a4de9115d52911e39cb29a566ab446c6962a252ce01020ffd616b5854a9d8230414262bfafe2
-
MD5
c87e1dee1275fed1f7ee813b97ccb17b
SHA1e8313978e3c0dff6355b843cd470949c719032c6
SHA25692bb3324b68e8780d718ed808cb9633dc1ef1f7988d2b85cc0f9f431ed63a63d
SHA5122d2177413ed0767651789363c2b952ff8fba26de6ebb84a6390af6bc87927577bedf08b802f5bd6e937e7462bddbd707100108ccf6ef4f39ded65bdcb8b40f35
-
MD5
f776deb4df137b37dcae5406c8f3a07a
SHA1f6a31b594fca39c118927405fa4d14353b8fd49a
SHA25693cc5e6a6b671d9b0124ade32ae8b09269de9f03c5c5e66347fbfc7a8c3b305e
SHA5124077b4214b4683bb4776d470027e61fcc3cb3e78beb9377674e4a4de9115d52911e39cb29a566ab446c6962a252ce01020ffd616b5854a9d8230414262bfafe2