Overview
overview
10Static
static
Datop/test.test.dll
windows7_x64
1Datop/test.test.dll
windows10_x64
3Datop/test1.test.dll
windows7_x64
10Datop/test1.test.dll
windows10_x64
10Datop/test2.test.dll
windows7_x64
1Datop/test2.test.dll
windows10_x64
3specificat...09.xls
windows7_x64
10specificat...09.xls
windows10_x64
10qrzteemm.dll
windows7_x64
10qrzteemm.dll
windows10_x64
10specificat...09.xls
windows7_x64
10specificat...09.xls
windows10_x64
10Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
24-09-2021 17:31
Static task
static1
Behavioral task
behavioral1
Sample
Datop/test.test.dll
Resource
win7v20210408
Behavioral task
behavioral2
Sample
Datop/test.test.dll
Resource
win10-en-20210920
Behavioral task
behavioral3
Sample
Datop/test1.test.dll
Resource
win7v20210408
Behavioral task
behavioral4
Sample
Datop/test1.test.dll
Resource
win10-en-20210920
Behavioral task
behavioral5
Sample
Datop/test2.test.dll
Resource
win7-en-20210920
Behavioral task
behavioral6
Sample
Datop/test2.test.dll
Resource
win10v20210408
Behavioral task
behavioral7
Sample
specification-730729009.xls
Resource
win7-en-20210920
Behavioral task
behavioral8
Sample
specification-730729009.xls
Resource
win10v20210408
Behavioral task
behavioral9
Sample
qrzteemm.dll
Resource
win7-en-20210920
Behavioral task
behavioral10
Sample
qrzteemm.dll
Resource
win10v20210408
Behavioral task
behavioral11
Sample
specification-730729009.xls
Resource
win7-en-20210920
Behavioral task
behavioral12
Sample
specification-730729009.xls
Resource
win10-en-20210920
General
-
Target
specification-730729009.xls
-
Size
258KB
-
MD5
18df8b279d3bb6c443eea9c9efc47636
-
SHA1
03125e165dccb330c3bdbc92bab0bf275de626b4
-
SHA256
9d4d08dd78894b65adc73fe96371f94437f902797fd5ce407aabc9937cd4a5c1
-
SHA512
ad6bc0babfdb9d8cb92dee36ca2b7e024d52f5adef68f9307de24cbc139cd69369c2be878952b516c18fcc4b7f798e86e382a53f9a42fda77b6abd8ed16e20c6
Malware Config
Extracted
https://ricardopiresfotografia.com/RpuaNlWy/host.html
https://keysite.com.co/IQ3mbS6EF/host.html
https://colegiobilinguepioxii.com.co/SYqvKoF4/host.html
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2504 4016 regsvr32.exe 67 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3656 4016 regsvr32.exe 67 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3868 4016 regsvr32.exe 67 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4016 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE 4016 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4016 wrote to memory of 2504 4016 EXCEL.EXE 73 PID 4016 wrote to memory of 2504 4016 EXCEL.EXE 73 PID 4016 wrote to memory of 3656 4016 EXCEL.EXE 76 PID 4016 wrote to memory of 3656 4016 EXCEL.EXE 76 PID 4016 wrote to memory of 3868 4016 EXCEL.EXE 77 PID 4016 wrote to memory of 3868 4016 EXCEL.EXE 77
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\specification-730729009.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test.test2⤵
- Process spawned unexpected child process
PID:2504
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test2⤵
- Process spawned unexpected child process
PID:3656
-
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test2⤵
- Process spawned unexpected child process
PID:3868
-