Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
24-09-2021 07:22
Behavioral task
behavioral1
Sample
x8209.xlsb
Resource
win7-en-20210920
General
-
Target
x8209.xlsb
-
Size
116KB
-
MD5
c5a179c6fe1f057c380e64ad5a5151f1
-
SHA1
4b4c23004dab867b6759a921a24cfa181167ea62
-
SHA256
ca4010b0b7e840aed10f2439fc37429aa7c752cf8c312d5c3de01b3342dd69fb
-
SHA512
1ece527256a6460c99caf85b4c7ba399bf28796c5727a80b3f45176f47aef449145a92ccb7f55648dc41cb87391e322e8e6ac010b99a35ba9cf0aec0bb24e739
Malware Config
Extracted
http://phod.ru/image1.png
Extracted
njrat
ilfuoco.crabdance.com:1606
2cdbd061ab
-
reg_key
2cdbd061ab
-
splitter
@!#&^%$
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
inmonter.exepid process 868 inmonter.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1896 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 33 IoCs
Processes:
inmonter.exedescription pid process Token: SeDebugPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe Token: 33 868 inmonter.exe Token: SeIncBasePriorityPrivilege 868 inmonter.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid process 1896 EXCEL.EXE 1896 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE 1896 EXCEL.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 1896 wrote to memory of 868 1896 EXCEL.EXE inmonter.exe PID 1896 wrote to memory of 868 1896 EXCEL.EXE inmonter.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\x8209.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\KIS14.7\Security\inmonter.exe"C:\KIS14.7\Security\inmonter.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\KIS14.7\Security\inmonter.exeMD5
4d7c442ee41682bc23f89190f6d30ec9
SHA1544d50cf853121d3b169084e7b7fdcbe0b0ec9a3
SHA256836e0921a51d3e9bb91eb3a44f6cfe798dab4939b2ec5e6a39ff758db54e6b3d
SHA51219135b7e3f9fc2ca6b5c5853dbe94c4bb287067b3efba95e84402c086c9c3eb8253545127883b531374c91de5aa9c401e8fef64a0884bcb270e4e7d1d8fc49d3
-
C:\KIS14.7\Security\inmonter.exeMD5
4d7c442ee41682bc23f89190f6d30ec9
SHA1544d50cf853121d3b169084e7b7fdcbe0b0ec9a3
SHA256836e0921a51d3e9bb91eb3a44f6cfe798dab4939b2ec5e6a39ff758db54e6b3d
SHA51219135b7e3f9fc2ca6b5c5853dbe94c4bb287067b3efba95e84402c086c9c3eb8253545127883b531374c91de5aa9c401e8fef64a0884bcb270e4e7d1d8fc49d3
-
memory/868-287-0x0000000000690000-0x0000000000696000-memory.dmpFilesize
24KB
-
memory/868-273-0x0000000000000000-mapping.dmp
-
memory/868-288-0x000000001AEA0000-0x000000001AEA2000-memory.dmpFilesize
8KB
-
memory/868-286-0x0000000000620000-0x000000000062D000-memory.dmpFilesize
52KB
-
memory/868-278-0x0000000000640000-0x0000000000675000-memory.dmpFilesize
212KB
-
memory/868-276-0x00000000000F0000-0x00000000000F1000-memory.dmpFilesize
4KB
-
memory/1896-118-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-119-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-251-0x00007FFE9D6E0000-0x00007FFE9E5AD000-memory.dmpFilesize
14.8MB
-
memory/1896-120-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-126-0x00007FFEA1510000-0x00007FFEA3405000-memory.dmpFilesize
31.0MB
-
memory/1896-125-0x00007FFEA3410000-0x00007FFEA44FE000-memory.dmpFilesize
16.9MB
-
memory/1896-124-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-117-0x00007FF7AC8F0000-0x00007FF7AFEA6000-memory.dmpFilesize
53.7MB
-
memory/1896-121-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-308-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-309-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-310-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB
-
memory/1896-311-0x00007FFE82E80000-0x00007FFE82E90000-memory.dmpFilesize
64KB