Analysis
-
max time kernel
152s -
max time network
158s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
11-01-2022 21:02
Behavioral task
behavioral1
Sample
1db259b0063d26f9af684e7246d336250e289514a4e900eab1337ee9981a866b.xls
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
1db259b0063d26f9af684e7246d336250e289514a4e900eab1337ee9981a866b.xls
Resource
win10-en-20211208
General
-
Target
1db259b0063d26f9af684e7246d336250e289514a4e900eab1337ee9981a866b.xls
-
Size
113KB
-
MD5
1db77f0d16e44a513d941c17e895dd02
-
SHA1
a8451288d8309179bb580d9d6949ee23f7a24eaf
-
SHA256
1db259b0063d26f9af684e7246d336250e289514a4e900eab1337ee9981a866b
-
SHA512
bf0df083a63711cfddb999548afa1729e0fa4a637f1d35fe1eb282c46eed9fee55ff740e593c9893f241ad28975f5b032f8fbd4a72a5d9000115c135ff0a8719
Malware Config
Extracted
http://gaidov.bg/wp-includes/Ug/
http://studiokrishnaproduction.com/wp-includes/3mJ/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3580 3728 rundll32.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 44 3156 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 3580 rundll32.exe 3612 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Yxoadbilzqe\lasbslihpcj.hcn rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3728 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
rundll32.exepid process 3156 rundll32.exe 3156 rundll32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE 3728 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
EXCEL.EXErundll32.exerundll32.exerundll32.exedescription pid process target process PID 3728 wrote to memory of 3580 3728 EXCEL.EXE rundll32.exe PID 3728 wrote to memory of 3580 3728 EXCEL.EXE rundll32.exe PID 3728 wrote to memory of 3580 3728 EXCEL.EXE rundll32.exe PID 3580 wrote to memory of 3612 3580 rundll32.exe rundll32.exe PID 3580 wrote to memory of 3612 3580 rundll32.exe rundll32.exe PID 3580 wrote to memory of 3612 3580 rundll32.exe rundll32.exe PID 3612 wrote to memory of 964 3612 rundll32.exe rundll32.exe PID 3612 wrote to memory of 964 3612 rundll32.exe rundll32.exe PID 3612 wrote to memory of 964 3612 rundll32.exe rundll32.exe PID 964 wrote to memory of 3156 964 rundll32.exe rundll32.exe PID 964 wrote to memory of 3156 964 rundll32.exe rundll32.exe PID 964 wrote to memory of 3156 964 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1db259b0063d26f9af684e7246d336250e289514a4e900eab1337ee9981a866b.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\sun.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\sun.ocx",DllRegisterServer3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Yxoadbilzqe\lasbslihpcj.hcn",IUFnSfbJ4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Yxoadbilzqe\lasbslihpcj.hcn",DllRegisterServer5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\sun.ocxMD5
94f6b0e76810228edb6dfe5f6221c045
SHA154d2c313fbd0d098793c041e792d2a1d3dd7619e
SHA256b975a3d6b2be53f83665f04e7a1d678f99c5c472cac44547395dfc7feaa0a7f9
SHA5126eadcf1bc24e9b491c7bfe9a56a575089c3f84db5ac0557bce3b6a14975a788e2056585ff328380c5a455c7b42d5b52ddc4ba795a0a2fb82371da7b8952f63ed
-
\Users\Admin\sun.ocxMD5
94f6b0e76810228edb6dfe5f6221c045
SHA154d2c313fbd0d098793c041e792d2a1d3dd7619e
SHA256b975a3d6b2be53f83665f04e7a1d678f99c5c472cac44547395dfc7feaa0a7f9
SHA5126eadcf1bc24e9b491c7bfe9a56a575089c3f84db5ac0557bce3b6a14975a788e2056585ff328380c5a455c7b42d5b52ddc4ba795a0a2fb82371da7b8952f63ed
-
\Users\Admin\sun.ocxMD5
94f6b0e76810228edb6dfe5f6221c045
SHA154d2c313fbd0d098793c041e792d2a1d3dd7619e
SHA256b975a3d6b2be53f83665f04e7a1d678f99c5c472cac44547395dfc7feaa0a7f9
SHA5126eadcf1bc24e9b491c7bfe9a56a575089c3f84db5ac0557bce3b6a14975a788e2056585ff328380c5a455c7b42d5b52ddc4ba795a0a2fb82371da7b8952f63ed
-
memory/964-285-0x0000000000000000-mapping.dmp
-
memory/3156-290-0x0000000000000000-mapping.dmp
-
memory/3580-268-0x0000000000000000-mapping.dmp
-
memory/3612-273-0x0000000000000000-mapping.dmp
-
memory/3728-121-0x00007FFF65860000-0x00007FFF65870000-memory.dmpFilesize
64KB
-
memory/3728-125-0x000001BA318D0000-0x000001BA318D2000-memory.dmpFilesize
8KB
-
memory/3728-124-0x00007FFF65860000-0x00007FFF65870000-memory.dmpFilesize
64KB
-
memory/3728-122-0x000001BA318D0000-0x000001BA318D2000-memory.dmpFilesize
8KB
-
memory/3728-123-0x000001BA318D0000-0x000001BA318D2000-memory.dmpFilesize
8KB
-
memory/3728-118-0x00007FFF65860000-0x00007FFF65870000-memory.dmpFilesize
64KB
-
memory/3728-120-0x00007FFF65860000-0x00007FFF65870000-memory.dmpFilesize
64KB
-
memory/3728-119-0x00007FFF65860000-0x00007FFF65870000-memory.dmpFilesize
64KB