Resubmissions
09-12-2021 18:02
211209-wmyz3aeefp 1009-12-2021 13:52
211209-q6fpyadeck 1018-10-2021 09:36
211018-lkztgaecbm 1004-10-2021 17:53
211004-wgpjfaggb4 10Analysis
-
max time kernel
114s -
max time network
142s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
09-12-2021 18:02
Behavioral task
behavioral1
Sample
Invoice-5959498320211004.xlsb
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
Invoice-5959498320211004.xlsb
Resource
win10-en-20211208
General
-
Target
Invoice-5959498320211004.xlsb
-
Size
132KB
-
MD5
887bc475305003bdc34e671a2f3bd080
-
SHA1
7625f787be7479bf54addeff0ce7107cf0f59f23
-
SHA256
7e0b4b26bafd471703fac1db25b24936230aecad95732e66420184d717a111ee
-
SHA512
efb52e8c1fdf6e7cbc80b951220e25c78be0aad5c24b732696784b9b4d5d2c7a284df11fb0f524f64fa3f39a887069599c91f5233062d2aa8c01617104dd9ccd
Malware Config
Signatures
-
Process spawned unexpected child process 3 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
wmic.exemshta.exerundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3492 2544 wmic.exe EXCEL.EXE Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 2824 3628 mshta.exe Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3948 3628 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2544 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE 2544 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Invoice-5959498320211004.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Windows\System32\Wbem\wmic.exewmic process call create 'mshta C:\ProgramData\vlEUL.rtf'2⤵
- Process spawned unexpected child process
PID:3492
-
-
C:\Windows\system32\mshta.exemshta C:\ProgramData\vlEUL.rtf1⤵
- Process spawned unexpected child process
PID:2824 -
C:\Windows\system32\mshta.exemshta C:\\ProgramData\penchs.rtf2⤵PID:612
-
C:\Windows\System32\Wbem\wmic.exewmic process call create "rundll32.exe C:\\ProgramData\penchs.png HalGetVectorInput"3⤵PID:1152
-
-
-
C:\Windows\system32\rundll32.exerundll32.exe C:\\ProgramData\penchs.png HalGetVectorInput1⤵
- Process spawned unexpected child process
PID:3948
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
4c6bd0c6ad0db354bd1327d0993bcbeb
SHA16f1967c122c876e6e3b1d440b2ea5d473555499d
SHA256636fa44a6ba723d5746b64a4411e8e330d4dcc34443962a2e7e2cc378efcec32
SHA51259434b260ce6d950e57d8d65ae2a547704989e775f4393fe20e781dc578262c6331fe17a13f8535c40ddffa8e5ca73e599f481cf8de84dcb7e83baae393194d6
-
MD5
f38dabb35050a8d240d93ae2239300c5
SHA12c4d2d18460cd684ac74e94768341807f46fe05b
SHA256fc4150684fe35650afaa37a47abd4ea3f3baf1faf022085b691314b72ded5063
SHA51204554121fe823238607455b899429f3cfd5b981b3dfcae68df2534f061191a02bae1ae944eaf8536e2a70a6291ff4e8666d873dede1cf7789737eaf47aff0155
-
MD5
031c5dfeaa97b80bff2c5fd7999352ac
SHA10e89ec2d13631c157f7e577b7617099bc5e45cd5
SHA2566fbff6199b9a527c7a6c5ccec275a8ffda62f13b4ad29700075c2a8c217b11b6
SHA512766d84ace8e3d0683ab534c2c45bbedbd731121f0bf330edef51ae787350b8a6c81b6d0e103832c185677cdf778bd5567c877ff5e90e3e7ec2ed298c1f11529c