Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 05:14
Behavioral task
behavioral1
Sample
3e47f75fb9dbb067e2b47049666fc1d2.xls
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
3e47f75fb9dbb067e2b47049666fc1d2.xls
Resource
win10-en-20211208
General
-
Target
3e47f75fb9dbb067e2b47049666fc1d2.xls
-
Size
113KB
-
MD5
3e47f75fb9dbb067e2b47049666fc1d2
-
SHA1
df51ed9b3c9bc6bbef920f2de3bedeccda5217c3
-
SHA256
aa65a34067b0c50e89c1078d0c7ff08de43e5036241404574f846265de6ff6bd
-
SHA512
878839b9037053905384417e505741ef74622804eb384f84d1cd1b8b96eb8b0521d6f248f5a9ae635c2367cab17669db248156ef0ca5f11d6a54f3adc0d118eb
Malware Config
Extracted
http://ordinateur.ogivart.us/editor/Qpo7OAOnbe/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3544 524 rundll32.exe 68 -
Blocklisted process makes network request 1 IoCs
flow pid Process 42 3276 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
pid Process 3544 rundll32.exe 2120 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Euedlbnqzqueuy\jrsmmijzho.kbs rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 524 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3276 rundll32.exe 3276 rundll32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE 524 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 524 wrote to memory of 3544 524 EXCEL.EXE 71 PID 524 wrote to memory of 3544 524 EXCEL.EXE 71 PID 524 wrote to memory of 3544 524 EXCEL.EXE 71 PID 3544 wrote to memory of 2120 3544 rundll32.exe 72 PID 3544 wrote to memory of 2120 3544 rundll32.exe 72 PID 3544 wrote to memory of 2120 3544 rundll32.exe 72 PID 2120 wrote to memory of 3204 2120 rundll32.exe 73 PID 2120 wrote to memory of 3204 2120 rundll32.exe 73 PID 2120 wrote to memory of 3204 2120 rundll32.exe 73 PID 3204 wrote to memory of 3276 3204 rundll32.exe 74 PID 3204 wrote to memory of 3276 3204 rundll32.exe 74 PID 3204 wrote to memory of 3276 3204 rundll32.exe 74
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3e47f75fb9dbb067e2b47049666fc1d2.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\sun.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\sun.ocx",DllRegisterServer3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Euedlbnqzqueuy\jrsmmijzho.kbs",xpFerDiXXZs4⤵
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Euedlbnqzqueuy\jrsmmijzho.kbs",DllRegisterServer5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3276
-
-
-
-