Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
27-09-2021 16:50
Static task
static1
Behavioral task
behavioral1
Sample
dfddddds.xls
Resource
win7-en-20210920
General
-
Target
dfddddds.xls
-
Size
233KB
-
MD5
e9d2197a805286d20d558494ded11653
-
SHA1
e5a90cfde2deba21696a6d7a7e34d360af1665cf
-
SHA256
386eff5a2d8c900ec979a89b4c2575d9fb5fd7fa7a078c34487aa7fc5371bcab
-
SHA512
2a9d87ffbf239ce6029b773b4619cf4cfa1a39040d243d7f5f471c7937aa985f73eba873fd6e15779dec707221b9809e09ca143422c4d1c5fba728c1fcf417e4
Malware Config
Extracted
https://maxdigitizing.com/wAbCNMUm/pp.html
https://turnipshop.com/ihiRzoi1/pp.html
https://dynamiclifts.co.in/1PWQQcv0D/pp.html
Extracted
qakbot
402.343
tr
1632730751
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2904 740 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3800 740 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3172 740 regsvr32.exe EXCEL.EXE -
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 412 regsvr32.exe 3932 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 740 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
regsvr32.exepid process 412 regsvr32.exe 412 regsvr32.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
regsvr32.exepid process 412 regsvr32.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE 740 EXCEL.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exedescription pid process target process PID 740 wrote to memory of 2904 740 EXCEL.EXE regsvr32.exe PID 740 wrote to memory of 2904 740 EXCEL.EXE regsvr32.exe PID 740 wrote to memory of 3800 740 EXCEL.EXE regsvr32.exe PID 740 wrote to memory of 3800 740 EXCEL.EXE regsvr32.exe PID 740 wrote to memory of 3172 740 EXCEL.EXE regsvr32.exe PID 740 wrote to memory of 3172 740 EXCEL.EXE regsvr32.exe PID 2904 wrote to memory of 412 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 412 2904 regsvr32.exe regsvr32.exe PID 2904 wrote to memory of 412 2904 regsvr32.exe regsvr32.exe PID 412 wrote to memory of 416 412 regsvr32.exe explorer.exe PID 412 wrote to memory of 416 412 regsvr32.exe explorer.exe PID 412 wrote to memory of 416 412 regsvr32.exe explorer.exe PID 412 wrote to memory of 416 412 regsvr32.exe explorer.exe PID 412 wrote to memory of 416 412 regsvr32.exe explorer.exe PID 416 wrote to memory of 968 416 explorer.exe schtasks.exe PID 416 wrote to memory of 968 416 explorer.exe schtasks.exe PID 416 wrote to memory of 968 416 explorer.exe schtasks.exe PID 1140 wrote to memory of 3932 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 3932 1140 regsvr32.exe regsvr32.exe PID 1140 wrote to memory of 3932 1140 regsvr32.exe regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dfddddds.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test.test2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Datop\test.test3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn scvocpfdy /tr "regsvr32.exe -s \"C:\Datop\test.test\"" /SC ONCE /Z /ST 18:53 /ET 19:055⤵
- Creates scheduled task(s)
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test1.test2⤵
- Process spawned unexpected child process
-
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" C:\Datop\test2.test2⤵
- Process spawned unexpected child process
-
\??\c:\windows\system32\regsvr32.exeregsvr32.exe -s "C:\Datop\test.test"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Datop\test.test"2⤵
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Datop\test.testMD5
cc1457731a711bc445bd0ad03234df5d
SHA1a894943cd26af9b8908792402e152aee9ac723f5
SHA25651426703eccfb0b85c4051fa36ad9830828c85434a60d7c53328bf46fd1edf5c
SHA512d67eda4c707e1a14326cdccb3d143bc4aeb6646de76e100e14a96db4d3400b34e0f28f7c5206cb5a0bb6dc8d441d406929b3695249545fc1afc5f0eef66a2a6c
-
C:\Datop\test.testMD5
cc1457731a711bc445bd0ad03234df5d
SHA1a894943cd26af9b8908792402e152aee9ac723f5
SHA25651426703eccfb0b85c4051fa36ad9830828c85434a60d7c53328bf46fd1edf5c
SHA512d67eda4c707e1a14326cdccb3d143bc4aeb6646de76e100e14a96db4d3400b34e0f28f7c5206cb5a0bb6dc8d441d406929b3695249545fc1afc5f0eef66a2a6c
-
\Datop\test.testMD5
cc1457731a711bc445bd0ad03234df5d
SHA1a894943cd26af9b8908792402e152aee9ac723f5
SHA25651426703eccfb0b85c4051fa36ad9830828c85434a60d7c53328bf46fd1edf5c
SHA512d67eda4c707e1a14326cdccb3d143bc4aeb6646de76e100e14a96db4d3400b34e0f28f7c5206cb5a0bb6dc8d441d406929b3695249545fc1afc5f0eef66a2a6c
-
\Datop\test.testMD5
cc1457731a711bc445bd0ad03234df5d
SHA1a894943cd26af9b8908792402e152aee9ac723f5
SHA25651426703eccfb0b85c4051fa36ad9830828c85434a60d7c53328bf46fd1edf5c
SHA512d67eda4c707e1a14326cdccb3d143bc4aeb6646de76e100e14a96db4d3400b34e0f28f7c5206cb5a0bb6dc8d441d406929b3695249545fc1afc5f0eef66a2a6c
-
memory/412-292-0x0000000002B10000-0x0000000002B11000-memory.dmpFilesize
4KB
-
memory/412-290-0x0000000074270000-0x0000000074291000-memory.dmpFilesize
132KB
-
memory/412-291-0x0000000074270000-0x00000000743D8000-memory.dmpFilesize
1.4MB
-
memory/412-288-0x0000000000000000-mapping.dmp
-
memory/416-294-0x0000000000AD0000-0x0000000000AF1000-memory.dmpFilesize
132KB
-
memory/416-293-0x0000000000000000-mapping.dmp
-
memory/740-121-0x00007FF999990000-0x00007FF9999A0000-memory.dmpFilesize
64KB
-
memory/740-123-0x00007FF9B9520000-0x00007FF9BB415000-memory.dmpFilesize
31.0MB
-
memory/740-122-0x00007FF9BB420000-0x00007FF9BC50E000-memory.dmpFilesize
16.9MB
-
memory/740-114-0x00007FF768C10000-0x00007FF76C1C6000-memory.dmpFilesize
53.7MB
-
memory/740-118-0x00007FF999990000-0x00007FF9999A0000-memory.dmpFilesize
64KB
-
memory/740-117-0x00007FF999990000-0x00007FF9999A0000-memory.dmpFilesize
64KB
-
memory/740-116-0x00007FF999990000-0x00007FF9999A0000-memory.dmpFilesize
64KB
-
memory/740-115-0x00007FF999990000-0x00007FF9999A0000-memory.dmpFilesize
64KB
-
memory/968-295-0x0000000000000000-mapping.dmp
-
memory/2904-278-0x0000000000000000-mapping.dmp
-
memory/3172-283-0x0000000000000000-mapping.dmp
-
memory/3800-281-0x0000000000000000-mapping.dmp
-
memory/3932-299-0x0000000000000000-mapping.dmp