Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    11-01-2022 22:04

General

  • Target

    2d8078458561a6fcfce9c3921c79bc93.xls

  • Size

    113KB

  • MD5

    2d8078458561a6fcfce9c3921c79bc93

  • SHA1

    6a54ecb2288e38f79ede46898c374308e5810b13

  • SHA256

    d041eb4d27665d30fa516a31242774fa89c5e50f30253637454ca9d6db135dfb

  • SHA512

    1e166ac645c5ff25e6501965a2d411f910d73d2c9910a86524ea5cea723b954fba525c812f5456553fbf88344ffe7d50639e156375787e9b585d3a44da99d825

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2d8078458561a6fcfce9c3921c79bc93.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:912
    • C:\Windows\SysWow64\rundll32.exe
      C:\Windows\SysWow64\rundll32.exe ..\sun.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:3740
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\sun.ocx",DllRegisterServer
        3⤵
        • Loads dropped DLL
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Qzaizer\wskaropnn.tpl",FxagLAodyCP
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3724
          • C:\Windows\SysWOW64\rundll32.exe
            C:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Qzaizer\wskaropnn.tpl",DllRegisterServer
            5⤵
            • Blocklisted process makes network request
            • Suspicious behavior: EnumeratesProcesses
            PID:3692

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sun.ocx

    MD5

    8d1e3d273a2b657adba9ef908c9c7f9c

    SHA1

    2baa1857daf192135b2281469b2bf8f4e04a0092

    SHA256

    867911a57f78acc85fd70cd124ca9ac8e875e85837685cabc9adb1fec490abc0

    SHA512

    ab93a2273ea4db83a4656a2d0b1af582200baef1db8d3d7a8b67ef83e475f195cb310917dc03dad9961ca18a35ecfa4770c9b996fde2b064c159a80ee2ce826e

  • \Users\Admin\sun.ocx

    MD5

    8d1e3d273a2b657adba9ef908c9c7f9c

    SHA1

    2baa1857daf192135b2281469b2bf8f4e04a0092

    SHA256

    867911a57f78acc85fd70cd124ca9ac8e875e85837685cabc9adb1fec490abc0

    SHA512

    ab93a2273ea4db83a4656a2d0b1af582200baef1db8d3d7a8b67ef83e475f195cb310917dc03dad9961ca18a35ecfa4770c9b996fde2b064c159a80ee2ce826e

  • \Users\Admin\sun.ocx

    MD5

    8d1e3d273a2b657adba9ef908c9c7f9c

    SHA1

    2baa1857daf192135b2281469b2bf8f4e04a0092

    SHA256

    867911a57f78acc85fd70cd124ca9ac8e875e85837685cabc9adb1fec490abc0

    SHA512

    ab93a2273ea4db83a4656a2d0b1af582200baef1db8d3d7a8b67ef83e475f195cb310917dc03dad9961ca18a35ecfa4770c9b996fde2b064c159a80ee2ce826e

  • memory/848-266-0x0000000000000000-mapping.dmp

  • memory/912-119-0x00007FFE01550000-0x00007FFE01560000-memory.dmp

    Filesize

    64KB

  • memory/912-120-0x0000022DB5720000-0x0000022DB5722000-memory.dmp

    Filesize

    8KB

  • memory/912-121-0x0000022DB5720000-0x0000022DB5722000-memory.dmp

    Filesize

    8KB

  • memory/912-122-0x0000022DB5720000-0x0000022DB5722000-memory.dmp

    Filesize

    8KB

  • memory/912-128-0x00007FFDFE4D0000-0x00007FFDFE4E0000-memory.dmp

    Filesize

    64KB

  • memory/912-129-0x00007FFDFE4D0000-0x00007FFDFE4E0000-memory.dmp

    Filesize

    64KB

  • memory/912-115-0x00007FFE01550000-0x00007FFE01560000-memory.dmp

    Filesize

    64KB

  • memory/912-118-0x00007FFE01550000-0x00007FFE01560000-memory.dmp

    Filesize

    64KB

  • memory/912-117-0x00007FFE01550000-0x00007FFE01560000-memory.dmp

    Filesize

    64KB

  • memory/912-116-0x00007FFE01550000-0x00007FFE01560000-memory.dmp

    Filesize

    64KB

  • memory/3692-284-0x0000000000000000-mapping.dmp

  • memory/3724-279-0x0000000000000000-mapping.dmp

  • memory/3740-261-0x0000000000000000-mapping.dmp