plan-515372324.xlsb
plan-515372324.xlsb
155KB
29-06-2021 22:07
08e52afbefa423fb9f1ea0af88a4880e
2d688dfee28f75553bc1d3633f891d2e70e0408b
aaa32ff3e41c61fe828f0850e702f5ed7ffd6177c4bf80ed15324525537f44cd
Extracted
Language | xlm4.0 |
Source |
|
URLs |
xlm40.dropper
https://khangland.pro/v8gEDeSB/sun.html xlm40.dropperhttps://jaipurbynite.com/stLdQs9R53/sun.htm |
Filter: none
-
Process spawned unexpected child processregsvr32.exeregsvr32.exe
Description
This typically indicates the parent process was compromised via an exploit or macro.
Reported IOCs
description pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3148 3236 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2192 3236 regsvr32.exe EXCEL.EXE -
Checks processor information in registryEXCEL.EXE
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registryEXCEL.EXE
TTPs
Reported IOCs
description ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListenerEXCEL.EXE
Reported IOCs
pid process 3236 EXCEL.EXE -
Suspicious use of FindShellTrayWindowEXCEL.EXE
Reported IOCs
pid process 3236 EXCEL.EXE 3236 EXCEL.EXE -
Suspicious use of SetWindowsHookExEXCEL.EXE
Reported IOCs
pid process 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE 3236 EXCEL.EXE -
Suspicious use of WriteProcessMemoryEXCEL.EXE
Reported IOCs
description pid process target process PID 3236 wrote to memory of 3800 3236 EXCEL.EXE splwow64.exe PID 3236 wrote to memory of 3800 3236 EXCEL.EXE splwow64.exe PID 3236 wrote to memory of 3148 3236 EXCEL.EXE regsvr32.exe PID 3236 wrote to memory of 3148 3236 EXCEL.EXE regsvr32.exe PID 3236 wrote to memory of 2192 3236 EXCEL.EXE regsvr32.exe PID 3236 wrote to memory of 2192 3236 EXCEL.EXE regsvr32.exe
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\plan-515372324.xlsb"Checks processor information in registryEnumerates system info in registrySuspicious behavior: AddClipboardFormatListenerSuspicious use of FindShellTrayWindowSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 12288
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 ..\palpy1.dllProcess spawned unexpected child process
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 ..\palpy2.dllProcess spawned unexpected child process
-
memory/2192-181-0x0000000000000000-mapping.dmp
-
memory/3148-180-0x0000000000000000-mapping.dmp
-
memory/3236-114-0x00007FF6FE240000-0x00007FF7017F6000-memory.dmp
-
memory/3236-115-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
-
memory/3236-116-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
-
memory/3236-119-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
-
memory/3236-122-0x00007FFA28EA0000-0x00007FFA29F8E000-memory.dmp
-
memory/3236-123-0x00007FFA26EE0000-0x00007FFA28DD5000-memory.dmp
-
memory/3236-117-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
-
memory/3236-118-0x00007FFA08250000-0x00007FFA08260000-memory.dmp
-
memory/3800-179-0x0000000000000000-mapping.dmp