Analysis
-
max time kernel
72s -
max time network
166s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
01-06-2021 16:54
Static task
static1
Behavioral task
behavioral1
Sample
document-37-1849.xls
Resource
win7v20210408
Behavioral task
behavioral2
Sample
document-37-1849.xls
Resource
win10v20210410
General
-
Target
document-37-1849.xls
-
Size
187KB
-
MD5
c41a21a821bcdea1d3ab26ebef055eed
-
SHA1
912c8c1792dd33bac263df4b71242078d74741e9
-
SHA256
d1d0ac76e59b9e2a8ae3a433e0186d74fc61417c89fe5ee4b93c02faa1dc58f8
-
SHA512
ed665e9a7d3e950318628ad4ea112da063e4f156ea7d2d58fbeaa31cc2486c7d2debb779da72723d8f55bdec6b9a4b87f9d148c50b0a368c4bc5b59ac646a42a
Malware Config
Extracted
https://austinheisey.com/xls/black/index/processingSetRequestDownloadPayloader/?servername=excel
Signatures
-
DoubleBack
DoubleBack is a modular backdoor first seen in December 2020.
-
DoubleBack x64 Payload 2 IoCs
resource yara_rule behavioral1/files/0x00030000000130d7-70.dat family_doubleback_x64 behavioral1/files/0x00030000000130d7-69.dat family_doubleback_x64 -
DoubleBack x86 Payload 2 IoCs
resource yara_rule behavioral1/files/0x00030000000130d7-70.dat family_doubleback_x86 behavioral1/files/0x00030000000130d7-69.dat family_doubleback_x86 -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1060 1832 cmd.exe 24 -
Downloads MZ/PE file
-
Executes dropped EXE 1 IoCs
pid Process 948 pDImcT.exe -
Loads dropped DLL 2 IoCs
pid Process 1832 EXCEL.EXE 948 pDImcT.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1832 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1832 EXCEL.EXE 1832 EXCEL.EXE 1832 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1832 wrote to memory of 1060 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 1060 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 1060 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 1060 1832 EXCEL.EXE 31 PID 1832 wrote to memory of 948 1832 EXCEL.EXE 33 PID 1832 wrote to memory of 948 1832 EXCEL.EXE 33 PID 1832 wrote to memory of 948 1832 EXCEL.EXE 33 PID 1832 wrote to memory of 948 1832 EXCEL.EXE 33
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\document-37-1849.xls1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c copy "%ProgramFiles(x86)%\Internet Explorer\ExtExport.exe" C:\ycjqFXSM\kO2NIybn\pDImcT.exe2⤵
- Process spawned unexpected child process
PID:1060
-
-
C:\ycjqFXSM\kO2NIybn\pDImcT.exe"C:\ycjqFXSM\kO2NIybn\pDImcT.exe" C:\ycjqFXSM\kO2NIybn ALHJ zqtRI2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:948
-