Resubmissions
09-12-2021 18:02
211209-wmyz3aeefp 1009-12-2021 13:52
211209-q6fpyadeck 1018-10-2021 09:36
211018-lkztgaecbm 1004-10-2021 17:53
211004-wgpjfaggb4 10Analysis
-
max time kernel
112s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 13:52
Behavioral task
behavioral1
Sample
Invoice-5959498320211004.xlsb
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Invoice-5959498320211004.xlsb
Resource
win10-en-20211208
General
-
Target
Invoice-5959498320211004.xlsb
-
Size
132KB
-
MD5
887bc475305003bdc34e671a2f3bd080
-
SHA1
7625f787be7479bf54addeff0ce7107cf0f59f23
-
SHA256
7e0b4b26bafd471703fac1db25b24936230aecad95732e66420184d717a111ee
-
SHA512
efb52e8c1fdf6e7cbc80b951220e25c78be0aad5c24b732696784b9b4d5d2c7a284df11fb0f524f64fa3f39a887069599c91f5233062d2aa8c01617104dd9ccd
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
wmic.exemshta.exerundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3504 2608 wmic.exe EXCEL.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3000 3392 mshta.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1532 3392 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2608 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE 2608 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-5959498320211004.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Windows\System32\Wbem\wmic.exewmic process call create 'mshta C:\ProgramData\vlEUL.rtf'2⤵
- Process spawned unexpected child process
PID:3504
-
-
C:\Windows\system32\mshta.exemshta C:\ProgramData\vlEUL.rtf1⤵
- Process spawned unexpected child process
PID:3000 -
C:\Windows\system32\mshta.exemshta C:\\ProgramData\penchs.rtf2⤵PID:3128
-
C:\Windows\System32\Wbem\wmic.exewmic process call create "rundll32.exe C:\\ProgramData\penchs.png HalGetVectorInput"3⤵PID:1032
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\\ProgramData\penchs.png HalGetVectorInput1⤵
- Process spawned unexpected child process
PID:1532
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
6a791f933aa05441f8790180379f96ac
SHA1b7f3f52b8fd3f7fc9c4dcb3d397349ed3c6271be
SHA256d60d5aa3a2bc7f3f6fa222117cbe69c5b9b7fb802cd2d02d36c9680c7f6aa741
SHA512bc25e5e873e576cca4f4d5e26e005cb8cf29047837e2f463b9461977cf888138742e61c47b4c0e72902a97523efa44399a08d91dc038516e7f3394dd092c90e8
-
MD5
f38dabb35050a8d240d93ae2239300c5
SHA12c4d2d18460cd684ac74e94768341807f46fe05b
SHA256fc4150684fe35650afaa37a47abd4ea3f3baf1faf022085b691314b72ded5063
SHA51204554121fe823238607455b899429f3cfd5b981b3dfcae68df2534f061191a02bae1ae944eaf8536e2a70a6291ff4e8666d873dede1cf7789737eaf47aff0155
-
MD5
031c5dfeaa97b80bff2c5fd7999352ac
SHA10e89ec2d13631c157f7e577b7617099bc5e45cd5
SHA2566fbff6199b9a527c7a6c5ccec275a8ffda62f13b4ad29700075c2a8c217b11b6
SHA512766d84ace8e3d0683ab534c2c45bbedbd731121f0bf330edef51ae787350b8a6c81b6d0e103832c185677cdf778bd5567c877ff5e90e3e7ec2ed298c1f11529c