Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
08-04-2021 06:09
Static task
static1
Behavioral task
behavioral1
Sample
PR_A1191-04052021.xlsx
Resource
win7v20201028
Behavioral task
behavioral2
Sample
PR_A1191-04052021.xlsx
Resource
win10v20201028
General
-
Target
PR_A1191-04052021.xlsx
-
Size
2.1MB
-
MD5
7c87ef46e0285586d13ae8c4837b43b2
-
SHA1
34e125247aee2ff663f7fcae715dc87dc08f8ee9
-
SHA256
bd7c85d56fe722221c6b0d7e0c2c37e912f7b16a85dfd2d159c426b99e726ddd
-
SHA512
74f3c8d602383bdb86e00c93909aa82b2de682fb44d75275f12f75f6c2fa69757a4747e87d902a46430b8f04f118b0a4c6a9abd82c1326a21e0edfbd07bc3dbd
Malware Config
Extracted
lokibot
http://amrp.tw/ozi/gate.php
http://kbfvzoboss.bid/alien/fre.php
http://alphastand.trade/alien/fre.php
http://alphastand.win/alien/fre.php
http://alphastand.top/alien/fre.php
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
EQNEDT32.EXEflow pid process 5 268 EQNEDT32.EXE 8 268 EQNEDT32.EXE 10 268 EQNEDT32.EXE -
Executes dropped EXE 2 IoCs
Processes:
vbc.exevbc.exepid process 1536 vbc.exe 676 vbc.exe -
Loads dropped DLL 4 IoCs
Processes:
EQNEDT32.EXEvbc.exepid process 268 EQNEDT32.EXE 268 EQNEDT32.EXE 268 EQNEDT32.EXE 1536 vbc.exe -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
vbc.exedescription pid process target process PID 1536 set thread context of 676 1536 vbc.exe vbc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
NSIS installer 6 IoCs
Processes:
resource yara_rule \Users\Public\vbc.exe nsis_installer_1 \Users\Public\vbc.exe nsis_installer_1 \Users\Public\vbc.exe nsis_installer_1 C:\Users\Public\vbc.exe nsis_installer_1 C:\Users\Public\vbc.exe nsis_installer_1 C:\Users\Public\vbc.exe nsis_installer_1 -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
-
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1616 EXCEL.EXE -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
vbc.exepid process 1536 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
vbc.exedescription pid process Token: SeDebugPrivilege 676 vbc.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1616 EXCEL.EXE 1616 EXCEL.EXE 1616 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
EQNEDT32.EXEvbc.exedescription pid process target process PID 268 wrote to memory of 1536 268 EQNEDT32.EXE vbc.exe PID 268 wrote to memory of 1536 268 EQNEDT32.EXE vbc.exe PID 268 wrote to memory of 1536 268 EQNEDT32.EXE vbc.exe PID 268 wrote to memory of 1536 268 EQNEDT32.EXE vbc.exe PID 1536 wrote to memory of 676 1536 vbc.exe vbc.exe PID 1536 wrote to memory of 676 1536 vbc.exe vbc.exe PID 1536 wrote to memory of 676 1536 vbc.exe vbc.exe PID 1536 wrote to memory of 676 1536 vbc.exe vbc.exe PID 1536 wrote to memory of 676 1536 vbc.exe vbc.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PR_A1191-04052021.xlsx1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Users\Public\vbc.exe"C:\Users\Public\vbc.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Public\vbc.exeMD5
7b95e7c4b726fb678571f965327eb05c
SHA1e2afad566ae8d7929cad0ebc8272d9202700a334
SHA25690264601dc078ff9628a36dcca7a4ca0c65c7c68315601f6688f2690847fdab7
SHA5124d96cb34c39568b608087f65083e18ed30fbe36666cb2d52a10fde3289b36619a5f884d47637cef953f4a4d48278d54577e7749ef92d34aa533ec7b670320194
-
C:\Users\Public\vbc.exeMD5
7b95e7c4b726fb678571f965327eb05c
SHA1e2afad566ae8d7929cad0ebc8272d9202700a334
SHA25690264601dc078ff9628a36dcca7a4ca0c65c7c68315601f6688f2690847fdab7
SHA5124d96cb34c39568b608087f65083e18ed30fbe36666cb2d52a10fde3289b36619a5f884d47637cef953f4a4d48278d54577e7749ef92d34aa533ec7b670320194
-
C:\Users\Public\vbc.exeMD5
7b95e7c4b726fb678571f965327eb05c
SHA1e2afad566ae8d7929cad0ebc8272d9202700a334
SHA25690264601dc078ff9628a36dcca7a4ca0c65c7c68315601f6688f2690847fdab7
SHA5124d96cb34c39568b608087f65083e18ed30fbe36666cb2d52a10fde3289b36619a5f884d47637cef953f4a4d48278d54577e7749ef92d34aa533ec7b670320194
-
\Users\Admin\AppData\Local\Temp\nssDB81.tmp\tus4oj3.dllMD5
77fc437afe97d781991a4654276a7b5b
SHA13825c456dcfccb180ff477d8ee32b7a587091bd0
SHA256ad683777ecd3a926afe8b2f88d8a0be0705401a48b653d7a71f91f209d11efe3
SHA512f26b91a795ad0b8d9dc5073925cfe888c73c8fe17ae5b8b2df70c6f051eb8cf1249db59a1db882e6e3e8c60a4f4da55511d017be73d4935f74a7131dbf21acb4
-
\Users\Public\vbc.exeMD5
7b95e7c4b726fb678571f965327eb05c
SHA1e2afad566ae8d7929cad0ebc8272d9202700a334
SHA25690264601dc078ff9628a36dcca7a4ca0c65c7c68315601f6688f2690847fdab7
SHA5124d96cb34c39568b608087f65083e18ed30fbe36666cb2d52a10fde3289b36619a5f884d47637cef953f4a4d48278d54577e7749ef92d34aa533ec7b670320194
-
\Users\Public\vbc.exeMD5
7b95e7c4b726fb678571f965327eb05c
SHA1e2afad566ae8d7929cad0ebc8272d9202700a334
SHA25690264601dc078ff9628a36dcca7a4ca0c65c7c68315601f6688f2690847fdab7
SHA5124d96cb34c39568b608087f65083e18ed30fbe36666cb2d52a10fde3289b36619a5f884d47637cef953f4a4d48278d54577e7749ef92d34aa533ec7b670320194
-
\Users\Public\vbc.exeMD5
7b95e7c4b726fb678571f965327eb05c
SHA1e2afad566ae8d7929cad0ebc8272d9202700a334
SHA25690264601dc078ff9628a36dcca7a4ca0c65c7c68315601f6688f2690847fdab7
SHA5124d96cb34c39568b608087f65083e18ed30fbe36666cb2d52a10fde3289b36619a5f884d47637cef953f4a4d48278d54577e7749ef92d34aa533ec7b670320194
-
memory/268-5-0x00000000765A1000-0x00000000765A3000-memory.dmpFilesize
8KB
-
memory/676-21-0x0000000000400000-0x00000000004A2000-memory.dmpFilesize
648KB
-
memory/676-18-0x00000000004139DE-mapping.dmp
-
memory/920-6-0x000007FEF7BD0000-0x000007FEF7E4A000-memory.dmpFilesize
2.5MB
-
memory/1536-10-0x0000000000000000-mapping.dmp
-
memory/1536-15-0x00000000003F0000-0x00000000003F2000-memory.dmpFilesize
8KB
-
memory/1616-88-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-104-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-4-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1616-3-0x0000000071A81000-0x0000000071A83000-memory.dmpFilesize
8KB
-
memory/1616-22-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-24-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-25-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-26-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-27-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-29-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-31-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-33-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-35-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-37-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-39-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-41-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-43-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-45-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-47-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-49-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-51-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-53-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-55-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-57-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-59-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-61-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-63-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-64-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-65-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-66-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-67-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-68-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-70-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-72-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-74-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-76-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-78-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-80-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-82-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-84-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-86-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-2-0x000000002F371000-0x000000002F374000-memory.dmpFilesize
12KB
-
memory/1616-90-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-92-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-94-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-96-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-98-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-100-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-102-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-16-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-106-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-108-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-110-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-112-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-114-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-116-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-118-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-120-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-122-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-124-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-126-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-128-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-130-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-132-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-134-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-136-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-138-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-140-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-142-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-144-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-146-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-148-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-150-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-152-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-154-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-156-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-158-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-160-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-162-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-164-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-166-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-168-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-170-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-172-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-174-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-176-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-178-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-180-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-182-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-184-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-186-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-188-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-190-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-192-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-194-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-196-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-198-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB
-
memory/1616-200-0x0000000002CD0000-0x0000000002CD1000-memory.dmpFilesize
4KB