Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-09-2021 11:59
Static task
static1
Behavioral task
behavioral1
Sample
waff.xls
Resource
win7-en-20210920
General
-
Target
waff.xls
-
Size
233KB
-
MD5
15950554dbc4a843ef439b46d31fe341
-
SHA1
e91c0e7f7cfe1034fe1a3d861334fdb34f2bb691
-
SHA256
2915591ef479332f179e26a3f6e4a63c35049569f5ca42d067f64dbdae681df9
-
SHA512
ac330f408ef28b27e7a8d17caa1cd9c21ecde824cf03bd75e767b8b206ced98b5522bea53042947336f15150d05b8408bc587c3b1929a71c610a05b64834512b
Malware Config
Extracted
https://maxdigitizing.com/wAbCNMUm/pp.html
https://turnipshop.com/ihiRzoi1/pp.html
https://dynamiclifts.co.in/1PWQQcv0D/pp.html
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3480 4796 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4564 4796 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4532 4796 regsvr32.exe EXCEL.EXE -
Loads dropped DLL 1 IoCs
Processes:
regsvr32.exepid process 4572 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4796 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 4572 regsvr32.exe 4572 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 4572 regsvr32.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE 4796 EXCEL.EXE -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 4796 wrote to memory of 3480 4796 EXCEL.EXE regsvr32.exe PID 4796 wrote to memory of 3480 4796 EXCEL.EXE regsvr32.exe PID 4796 wrote to memory of 4564 4796 EXCEL.EXE regsvr32.exe PID 4796 wrote to memory of 4564 4796 EXCEL.EXE regsvr32.exe PID 4796 wrote to memory of 4532 4796 EXCEL.EXE regsvr32.exe PID 4796 wrote to memory of 4532 4796 EXCEL.EXE regsvr32.exe PID 3480 wrote to memory of 4572 3480 regsvr32.exe regsvr32.exe PID 3480 wrote to memory of 4572 3480 regsvr32.exe regsvr32.exe PID 3480 wrote to memory of 4572 3480 regsvr32.exe regsvr32.exe PID 4572 wrote to memory of 4848 4572 regsvr32.exe explorer.exe PID 4572 wrote to memory of 4848 4572 regsvr32.exe explorer.exe PID 4572 wrote to memory of 4848 4572 regsvr32.exe explorer.exe PID 4572 wrote to memory of 4848 4572 regsvr32.exe explorer.exe PID 4572 wrote to memory of 4848 4572 regsvr32.exe explorer.exe PID 4848 wrote to memory of 4852 4848 explorer.exe schtasks.exe PID 4848 wrote to memory of 4852 4848 explorer.exe schtasks.exe PID 4848 wrote to memory of 4852 4848 explorer.exe schtasks.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\waff.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test.test2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Datop\test.test3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn rvfahslcyf /tr "regsvr32.exe -s \"C:\Datop\test.test\"" /SC ONCE /Z /ST 14:02 /ET 14:145⤵
- Creates scheduled task(s)
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test2⤵
- Process spawned unexpected child process
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test2⤵
- Process spawned unexpected child process
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Datop\test.testMD5
97406f2cee93cdb660848c99e6d291e6
SHA117aa4ce85e931fdf383b864144a3c1b6e68f91e2
SHA256336cdd146beca939c6d1e3e3c00cc10ec2d6e859a18d350bff937ad5194c27da
SHA5124884d65111c7da44832d30eb0cd7bcee9aceb6de24a610eb0709960d1276ad963214b8c620b14960a43319b0d77da7af3f622a5d6f1d36f31190ac2c641be4ef
-
\Datop\test.testMD5
97406f2cee93cdb660848c99e6d291e6
SHA117aa4ce85e931fdf383b864144a3c1b6e68f91e2
SHA256336cdd146beca939c6d1e3e3c00cc10ec2d6e859a18d350bff937ad5194c27da
SHA5124884d65111c7da44832d30eb0cd7bcee9aceb6de24a610eb0709960d1276ad963214b8c620b14960a43319b0d77da7af3f622a5d6f1d36f31190ac2c641be4ef
-
memory/3480-276-0x0000000000000000-mapping.dmp
-
memory/4532-281-0x0000000000000000-mapping.dmp
-
memory/4564-278-0x0000000000000000-mapping.dmp
-
memory/4572-291-0x00000000736C0000-0x0000000073828000-memory.dmpFilesize
1.4MB
-
memory/4572-286-0x0000000000000000-mapping.dmp
-
memory/4572-292-0x0000000000F00000-0x000000000104A000-memory.dmpFilesize
1.3MB
-
memory/4572-290-0x00000000736C0000-0x00000000736E1000-memory.dmpFilesize
132KB
-
memory/4796-118-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4796-117-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4796-116-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4796-122-0x00007FFD900C0000-0x00007FFD911AE000-memory.dmpFilesize
16.9MB
-
memory/4796-115-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4796-121-0x00007FFD6E7C0000-0x00007FFD6E7D0000-memory.dmpFilesize
64KB
-
memory/4796-114-0x00007FF765510000-0x00007FF768AC6000-memory.dmpFilesize
53.7MB
-
memory/4796-123-0x0000020AF20F0000-0x0000020AF3FE5000-memory.dmpFilesize
31.0MB
-
memory/4848-293-0x0000000000000000-mapping.dmp
-
memory/4848-294-0x0000000000930000-0x0000000000951000-memory.dmpFilesize
132KB
-
memory/4852-295-0x0000000000000000-mapping.dmp