Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
21-07-2021 15:01
Static task
static1
Behavioral task
behavioral1
Sample
b24e46b73441f06294548c8dcfea1b9a.xls
Resource
win7v20210408
General
-
Target
b24e46b73441f06294548c8dcfea1b9a.xls
-
Size
660KB
-
MD5
b24e46b73441f06294548c8dcfea1b9a
-
SHA1
9a1324e66fd2a6927fad5ca60d6fb87de3ccfd20
-
SHA256
8fffaedc7f8f3a6c84be5cd0e21ea9a3bc9c4b0700937f6b529a1d861f326710
-
SHA512
a4e05f93e8f20aa9215e5da1d1daf7dfc5ddae0b039c6d0602653d6a2b3da08a7125d5575df34032e5f47f1509ce360075dc31d3cc9d633bc3006687e0ea4a58
Malware Config
Extracted
dridex
22202
178.238.236.59:443
104.245.52.73:5007
81.0.236.93:13786
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
mshta.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 504 1868 mshta.exe EXCEL.EXE -
Processes:
resource yara_rule behavioral2/memory/4116-276-0x0000000073A60000-0x0000000073A91000-memory.dmp dridex_ldr -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 16 504 mshta.exe -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4116 rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1868 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE 1868 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
EXCEL.EXEmshta.exerundll32.exedescription pid process target process PID 1868 wrote to memory of 504 1868 EXCEL.EXE mshta.exe PID 1868 wrote to memory of 504 1868 EXCEL.EXE mshta.exe PID 504 wrote to memory of 2284 504 mshta.exe rundll32.exe PID 504 wrote to memory of 2284 504 mshta.exe rundll32.exe PID 2284 wrote to memory of 4116 2284 rundll32.exe rundll32.exe PID 2284 wrote to memory of 4116 2284 rundll32.exe rundll32.exe PID 2284 wrote to memory of 4116 2284 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\b24e46b73441f06294548c8dcfea1b9a.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\SYSTEM32\mshta.exemshta C:\ProgramData//klStockVOHLC.sct2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SYSTEM32\rundll32.exerundll32.exe C:\ProgramData\qSourcePivotTable.dll,SetRealTimeUsage3⤵
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\ProgramData\qSourcePivotTable.dll,SetRealTimeUsage4⤵
- Loads dropped DLL
- Checks whether UAC is enabled
PID:4116
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
09bd685c0c7f0aabaa1aebcb33d3b92d
SHA1bc97ef7992d606de885b02e4b5b9e8620938b766
SHA256c3968c50da67805b3f8be2a40cc39f7c8989e1b08846c942b314c6f26631a6ef
SHA5124dde8d2d841913e39e002416c09a8bb29897ed6adbed324490f3cc63287e3103159f8ad0049748bb535f4c9cb9e0b57d30300dd38eb1f443e36eaa74c75c3018
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360
-
MD5
fa5ec3e53520d0d4de5e26611b8cd51d
SHA16ce8c358ec95955f2816ab1bb376c025ade61922
SHA256ec705e006b4074a61b4b001660ce083e1948bb7ef17c69a90ad5ef5bb635d132
SHA512f3d538eb8e584079fe7dc57472a5859b2c935eacb449e94ece4bb6390d97bc4035015de3c5cb0836c58db581e40b821cdc98f16e5f9e6c344ce331372c914360