plan-515372324.xlsb
plan-515372324.xlsb
155KB
29-06-2021 22:07
08e52afbefa423fb9f1ea0af88a4880e
2d688dfee28f75553bc1d3633f891d2e70e0408b
aaa32ff3e41c61fe828f0850e702f5ed7ffd6177c4bf80ed15324525537f44cd
Extracted
Language | xlm4.0 |
Source |
|
URLs |
xlm40.dropper
https://khangland.pro/v8gEDeSB/sun.html xlm40.dropperhttps://jaipurbynite.com/stLdQs9R53/sun.htm |
Filter: none
-
Process spawned unexpected child processregsvr32.exeregsvr32.exe
Description
This typically indicates the parent process was compromised via an exploit or macro.
Reported IOCs
description pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 592 1840 regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1284 1840 regsvr32.exe EXCEL.EXE -
Enumerates system info in registryEXCEL.EXE
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Modifies Internet Explorer settingsEXCEL.EXE
Tags
TTPs
Reported IOCs
description ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListenerEXCEL.EXE
Reported IOCs
pid process 1840 EXCEL.EXE -
Suspicious use of SetWindowsHookExEXCEL.EXE
Reported IOCs
pid process 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE 1840 EXCEL.EXE -
Suspicious use of WriteProcessMemoryEXCEL.EXE
Reported IOCs
description pid process target process PID 1840 wrote to memory of 1696 1840 EXCEL.EXE splwow64.exe PID 1840 wrote to memory of 1696 1840 EXCEL.EXE splwow64.exe PID 1840 wrote to memory of 1696 1840 EXCEL.EXE splwow64.exe PID 1840 wrote to memory of 1696 1840 EXCEL.EXE splwow64.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 592 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe PID 1840 wrote to memory of 1284 1840 EXCEL.EXE regsvr32.exe
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\plan-515372324.xlsbEnumerates system info in registryModifies Internet Explorer settingsSuspicious behavior: AddClipboardFormatListenerSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 12288
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 ..\palpy1.dllProcess spawned unexpected child process
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 ..\palpy2.dllProcess spawned unexpected child process
-
memory/592-65-0x0000000074D91000-0x0000000074D93000-memory.dmp
-
memory/592-69-0x0000000000170000-0x0000000000171000-memory.dmp
-
memory/592-64-0x0000000000000000-mapping.dmp
-
memory/1284-66-0x0000000000000000-mapping.dmp
-
memory/1284-68-0x00000000001E0000-0x00000000001E1000-memory.dmp
-
memory/1696-63-0x000007FEFB681000-0x000007FEFB683000-memory.dmp
-
memory/1696-62-0x0000000000000000-mapping.dmp
-
memory/1840-59-0x000000002FFD1000-0x000000002FFD4000-memory.dmp
-
memory/1840-60-0x0000000070E81000-0x0000000070E83000-memory.dmp
-
memory/1840-61-0x000000005FFF0000-0x0000000060000000-memory.dmp