Analysis
-
max time kernel
69s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
14-04-2021 14:19
Behavioral task
behavioral1
Sample
documents-1472621861.xlsb
Resource
win7v20210410
windows7_x64
0 signatures
0 seconds
General
-
Target
documents-1472621861.xlsb
-
Size
94KB
-
MD5
7046115d4093bb8a33ae64df0a85c4dd
-
SHA1
602a43d4665ea83f3e1d0f1bc27ce83f515e6360
-
SHA256
e443c61de95ddab96eb2f2658ace7b6d9b03dc3b9b37068396ecd655eb543aec
-
SHA512
99c0183e937ab6a272fc4fda56eb4eac1e845d1f99a994290e3b380974e973be340b972d5d5186377f5448d949133b7e00790dbd05869b56bd2916c111dc1ef5
Score
10/10
Malware Config
Extracted
Language
xlm4.0
Source
URLs
xlm40.dropper
https://theottomandoner.co.uk/drms/bb.html
xlm40.dropper
http://paufderhar07ol.ru.com/bb.html
xlm40.dropper
http://nicolette7107gq.ru.com/bb.html
xlm40.dropper
https://chocolateuncle.online/drms/bb.html
xlm40.dropper
https://cablenet.com.ec/drms/bb.html
Signatures
-
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1252 452 rundll32.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1460 452 rundll32.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 740 452 rundll32.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1856 452 rundll32.exe 24 Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 296 452 rundll32.exe 24 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 452 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 452 EXCEL.EXE 452 EXCEL.EXE 452 EXCEL.EXE -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1252 452 EXCEL.EXE 31 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 1460 452 EXCEL.EXE 32 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 740 452 EXCEL.EXE 33 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 1856 452 EXCEL.EXE 34 PID 452 wrote to memory of 296 452 EXCEL.EXE 35 PID 452 wrote to memory of 296 452 EXCEL.EXE 35 PID 452 wrote to memory of 296 452 EXCEL.EXE 35 PID 452 wrote to memory of 296 452 EXCEL.EXE 35 PID 452 wrote to memory of 296 452 EXCEL.EXE 35 PID 452 wrote to memory of 296 452 EXCEL.EXE 35 PID 452 wrote to memory of 296 452 EXCEL.EXE 35
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\documents-1472621861.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\rundll32.exerundll32 ..\wiroe.oer1,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:1252
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 ..\wiroe.oer2,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:1460
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 ..\wiroe.oer3,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:740
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 ..\wiroe.oer4,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:1856
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 ..\wiroe.oer5,DllRegisterServer2⤵
- Process spawned unexpected child process
PID:296
-