Analysis
-
max time kernel
101s -
max time network
89s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
21-07-2021 19:24
Static task
static1
Behavioral task
behavioral1
Sample
15d1252024d046b76737f80017b31b5e.xls
Resource
win7v20210408
General
-
Target
15d1252024d046b76737f80017b31b5e.xls
-
Size
371KB
-
MD5
15d1252024d046b76737f80017b31b5e
-
SHA1
9d61edbf4819eb9ee8e6de03120ee06e1a8b592e
-
SHA256
4a8c152ef7c7e3ced93e8629691f6f66bb67f78c4e17caf0198db18300b19acf
-
SHA512
8f2819cfe537ba891ddc49d3eca12d2cb80c20a270e307822e5e79e2c1c246ad3a1099a1720d2ea9a3f0d6ab630e8bafd93a746f2267b888e3e61c9ee3289179
Malware Config
Extracted
dridex
22202
178.238.236.59:443
104.245.52.73:5007
81.0.236.93:13786
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 540 1652 mshta.exe EXCEL.EXE -
Processes:
resource yara_rule behavioral1/memory/1624-73-0x000000006A300000-0x000000006A331000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 3 540 mshta.exe -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
Processes:
rundll32.exepid process 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe 1624 rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEmshta.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2455352368-1077083310-2879168483-1000\Software\Microsoft\Internet Explorer\Main mshta.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1652 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
EXCEL.EXEpid process 1652 EXCEL.EXE 1652 EXCEL.EXE 1652 EXCEL.EXE 1652 EXCEL.EXE 1652 EXCEL.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
EXCEL.EXEmshta.exedescription pid process target process PID 1652 wrote to memory of 540 1652 EXCEL.EXE mshta.exe PID 1652 wrote to memory of 540 1652 EXCEL.EXE mshta.exe PID 1652 wrote to memory of 540 1652 EXCEL.EXE mshta.exe PID 1652 wrote to memory of 540 1652 EXCEL.EXE mshta.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe PID 540 wrote to memory of 1624 540 mshta.exe rundll32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\15d1252024d046b76737f80017b31b5e.xls1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\mshta.exemshta C:\ProgramData//klDialogDeleteFormat.sct2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Modifies Internet Explorer settings
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\ProgramData\qRangeAutoFormatTable1.dll,SetRealTimeUsage3⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:1624
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
8b456844dd984b342462d648348d6e41
SHA1b1f0e5628bc6a5ded67d2ba843a4b701d44960da
SHA2562c7694742f9fb9dd2c61fea62054b2acca9dfc458d880723285b02d01b0bf6e8
SHA5129c7aa647e1386c2454d9ca43e9ec3a561e7a31677b93471d38f0a2c38ca56a88cdffbd0572a523dad45c0affd65019788d36bb5703ef367bd5dd3f989c8e8d30
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360