Analysis
-
max time kernel
8s -
max time network
137s -
platform
windows11_x64 -
resource
win11 -
submitted
14-10-2021 15:17
Behavioral task
behavioral1
Sample
Bill_PYWTF0.xlsb
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
Bill_PYWTF0.xlsb
Resource
win11
Behavioral task
behavioral3
Sample
Bill_PYWTF0.xlsb
Resource
win10-en-20210920
Behavioral task
behavioral4
Sample
Bill_PYWTF0.xlsb
Resource
win10-en-20210920
General
-
Target
Bill_PYWTF0.xlsb
-
Size
264KB
-
MD5
29be144375ee1609c2c1fd63ae2ff514
-
SHA1
f37a8d5da9424bd916ed1c572b15173b5f430dd2
-
SHA256
1296ca015baa3dfae62d8cd6f6c1c1513fb919201a6c11f3df1474700d57fb26
-
SHA512
7873fffbc179dc3e8b415b72c2c3b736c7f4164e1a8a33c6d38cae5902466059f2fe50adf9ff0f2bba8411d373ceca02a950df9fd263624ab03014cf9879d752
Malware Config
Signatures
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Modifies data under HKEY_USERS 40 IoCs
Processes:
sihclient.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4868 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
svchost.exedescription pid process Token: SeSystemtimePrivilege 3844 svchost.exe Token: SeSystemtimePrivilege 3844 svchost.exe Token: SeIncBasePriorityPrivilege 3844 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
EXCEL.EXEpid process 4868 EXCEL.EXE 4868 EXCEL.EXE 4868 EXCEL.EXE 4868 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Bill_PYWTF0.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\Upfc.exeC:\Windows\System32\Upfc.exe /launchtype periodic /cv 5HeQu1KvjES1HkKiGcKODQ.01⤵
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv dn8LwwbFRkCXo9mq/8woaw.0.21⤵
- Modifies data under HKEY_USERS
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s W32Time1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵
-
C:\Windows\System32\WaaSMedicAgent.exeC:\Windows\System32\WaaSMedicAgent.exe 0572ccaef2b24c13cc022f6927cba2fc 5HeQu1KvjES1HkKiGcKODQ.0.1.0.3.01⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc1⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/920-164-0x000001D8718A0000-0x000001D8718A4000-memory.dmpFilesize
16KB
-
memory/2116-186-0x0000000000000000-mapping.dmp
-
memory/4868-166-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-185-0x0000027225030000-0x0000027225036000-memory.dmpFilesize
24KB
-
memory/4868-150-0x00007FFFB9D70000-0x00007FFFB9D80000-memory.dmpFilesize
64KB
-
memory/4868-167-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-152-0x00007FFFB9D70000-0x00007FFFB9D80000-memory.dmpFilesize
64KB
-
memory/4868-153-0x00007FFFB9D70000-0x00007FFFB9D80000-memory.dmpFilesize
64KB
-
memory/4868-154-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-155-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-156-0x00007FFFD4720000-0x00007FFFD580E000-memory.dmpFilesize
16.9MB
-
memory/4868-157-0x00007FFFD26D0000-0x00007FFFD45C5000-memory.dmpFilesize
31.0MB
-
memory/4868-158-0x00007FFFB7600000-0x00007FFFB7610000-memory.dmpFilesize
64KB
-
memory/4868-159-0x00007FFFB7600000-0x00007FFFB7610000-memory.dmpFilesize
64KB
-
memory/4868-162-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-163-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-169-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-165-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-184-0x0000027225030000-0x0000027225036000-memory.dmpFilesize
24KB
-
memory/4868-168-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-151-0x00007FFFB9D70000-0x00007FFFB9D80000-memory.dmpFilesize
64KB
-
memory/4868-149-0x00007FFFB9D70000-0x00007FFFB9D80000-memory.dmpFilesize
64KB
-
memory/4868-171-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-170-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-172-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-173-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-175-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-174-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-176-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-177-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-178-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-179-0x0000027225030000-0x0000027225032000-memory.dmpFilesize
8KB
-
memory/4868-180-0x0000027225030000-0x0000027225034000-memory.dmpFilesize
16KB
-
memory/4868-181-0x0000027225030000-0x0000027225036000-memory.dmpFilesize
24KB
-
memory/4868-182-0x0000027225030000-0x0000027225036000-memory.dmpFilesize
24KB
-
memory/4868-183-0x0000027225030000-0x0000027225036000-memory.dmpFilesize
24KB
-
memory/5020-146-0x00000203F9D70000-0x00000203F9D80000-memory.dmpFilesize
64KB
-
memory/5020-148-0x00000203FA9D0000-0x00000203FA9D4000-memory.dmpFilesize
16KB
-
memory/5020-147-0x00000203FA820000-0x00000203FA830000-memory.dmpFilesize
64KB