Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
22-12-2021 15:33
Static task
static1
Behavioral task
behavioral1
Sample
361138996b8beb0a2b93fc76b01de114.xlsm.vir.xlsm
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
361138996b8beb0a2b93fc76b01de114.xlsm.vir.xlsm
Resource
win10-en-20211208
General
-
Target
361138996b8beb0a2b93fc76b01de114.xlsm.vir.xlsm
-
Size
387KB
-
MD5
361138996b8beb0a2b93fc76b01de114
-
SHA1
93cde623489e7174d5d116c5fb0b35de691c78d8
-
SHA256
5c0a79af89a9383292db76652a6cfee60bc0509dc30250528f3c40002fc0f691
-
SHA512
3de36e66b73f20d601b0c074de22e6f3edaca6502c956f7cac412d2a6642bf9112195008c0ab551cf34c428a4604f134a9fd4ffdd52c609b786fe3a63cad5bd7
Malware Config
Signatures
-
Ostap JavaScript Downloader 1 IoCs
Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot
Processes:
resource yara_rule C:\Users\Admin\5034t.dert.jse family_ostap -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
explorer.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1404 368 explorer.exe EXCEL.EXE -
ostap
Ostap is a JS downloader, used to deliver other families.
-
Blocklisted process makes network request 1 IoCs
Processes:
WScript.exeflow pid process 43 696 WScript.exe -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
Processes:
DW20.EXEdescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1236 368 DW20.EXE EXCEL.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
Processes:
explorer.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-369956170-74428499-1628131376-1000_Classes\Local Settings explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 368 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
EXCEL.EXEdwwin.exepid process 368 EXCEL.EXE 368 EXCEL.EXE 1584 dwwin.exe 1584 dwwin.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE 368 EXCEL.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
EXCEL.EXEexplorer.exeDW20.EXEdescription pid process target process PID 368 wrote to memory of 1404 368 EXCEL.EXE explorer.exe PID 368 wrote to memory of 1404 368 EXCEL.EXE explorer.exe PID 1716 wrote to memory of 696 1716 explorer.exe WScript.exe PID 1716 wrote to memory of 696 1716 explorer.exe WScript.exe PID 368 wrote to memory of 2060 368 EXCEL.EXE splwow64.exe PID 368 wrote to memory of 2060 368 EXCEL.EXE splwow64.exe PID 368 wrote to memory of 1236 368 EXCEL.EXE DW20.EXE PID 368 wrote to memory of 1236 368 EXCEL.EXE DW20.EXE PID 1236 wrote to memory of 1584 1236 DW20.EXE dwwin.exe PID 1236 wrote to memory of 1584 1236 DW20.EXE dwwin.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\361138996b8beb0a2b93fc76b01de114.xlsm.vir.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\explorer.exe"C:\Windows\explorer.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\XLSTART\..\..\..\..\..\5034t.dert.jse"2⤵
- Process spawned unexpected child process
PID:1404
-
-
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2060
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 43522⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 43523⤵
- Suspicious behavior: EnumeratesProcesses
PID:1584
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\System32\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\5034t.dert.jse"2⤵
- Blocklisted process makes network request
PID:696
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0c24dcde2cd565de32848ee253ae4f19
SHA145b446f5082df17b02fed29b940bff9dad433313
SHA256b99df5c89301ff3c7e56a23f11e72b7255252ce03fcaa2899f854811de6668c4
SHA51268d627a368913c7038175f7efa82994b86b602bf11aac94528dc65d9bb102dd53a347090cbb3afb63d42b237ee06565132cb6235c9be47d0118cb1f58ffa4760