Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10_x64 -
resource
win10-en-20211208 -
submitted
12-01-2022 10:58
Behavioral task
behavioral1
Sample
c4d0f3ae42ee96525f7c0b08e3e7eab28f6560c351b324b2926d0e74cd8c004c.xlsm
Resource
win10-en-20211208
Behavioral task
behavioral2
Sample
c4d0f3ae42ee96525f7c0b08e3e7eab28f6560c351b324b2926d0e74cd8c004c.xlsm
Resource
win10-en-20211208
General
-
Target
c4d0f3ae42ee96525f7c0b08e3e7eab28f6560c351b324b2926d0e74cd8c004c.xlsm
-
Size
83KB
-
MD5
87c6c7d48700f1d10564840e9db0ee5a
-
SHA1
dc4ab236d49a710ba727cc5e8e0fca7511a028e3
-
SHA256
c4d0f3ae42ee96525f7c0b08e3e7eab28f6560c351b324b2926d0e74cd8c004c
-
SHA512
c41c1282a2c1d2c7a44ec1f625a3d3ca18fa4e7fbb52261df589d78e5a3c8da35f6a2715175d56fbf368d58569a8f55695a9777ea53ca5c75ce8173f00e2dc3d
Malware Config
Extracted
http://unifiedpharma.com/wp-admin/ildi5K2aTIrdvEobQ/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
rundll32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2264 2668 rundll32.exe EXCEL.EXE -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 2264 rundll32.exe 2704 rundll32.exe -
Drops file in System32 directory 1 IoCs
Processes:
rundll32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\Kcqlmkfmixmyjtb\nilitb.rvs rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 2668 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE 2668 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
EXCEL.EXErundll32.exerundll32.exedescription pid process target process PID 2668 wrote to memory of 2264 2668 EXCEL.EXE rundll32.exe PID 2668 wrote to memory of 2264 2668 EXCEL.EXE rundll32.exe PID 2668 wrote to memory of 2264 2668 EXCEL.EXE rundll32.exe PID 2264 wrote to memory of 2704 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2704 2264 rundll32.exe rundll32.exe PID 2264 wrote to memory of 2704 2264 rundll32.exe rundll32.exe PID 2704 wrote to memory of 3032 2704 rundll32.exe rundll32.exe PID 2704 wrote to memory of 3032 2704 rundll32.exe rundll32.exe PID 2704 wrote to memory of 3032 2704 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c4d0f3ae42ee96525f7c0b08e3e7eab28f6560c351b324b2926d0e74cd8c004c.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\adi.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\adi.ocx",DllRegisterServer3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Kcqlmkfmixmyjtb\nilitb.rvs",jTgHV4⤵PID:3032
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
0f1f8b89a7b572c18bb14f2ce2d2e9da
SHA1a1620f6a8e2e68df125cace56aa260f26bbf6ac9
SHA25686f64c6cbb58cb397befe5dfcbd8dff7b9d841c344609798150ece4fc2d67abe
SHA512a76e24a4f838b11358287e275e8a9d9da828acccc42f8798210e7fd17d7d8cdaf3328a83da99220ec836c484a17c9dcd48e31fecff2448b47e4f50b444c055b0
-
MD5
0f1f8b89a7b572c18bb14f2ce2d2e9da
SHA1a1620f6a8e2e68df125cace56aa260f26bbf6ac9
SHA25686f64c6cbb58cb397befe5dfcbd8dff7b9d841c344609798150ece4fc2d67abe
SHA512a76e24a4f838b11358287e275e8a9d9da828acccc42f8798210e7fd17d7d8cdaf3328a83da99220ec836c484a17c9dcd48e31fecff2448b47e4f50b444c055b0
-
MD5
0f1f8b89a7b572c18bb14f2ce2d2e9da
SHA1a1620f6a8e2e68df125cace56aa260f26bbf6ac9
SHA25686f64c6cbb58cb397befe5dfcbd8dff7b9d841c344609798150ece4fc2d67abe
SHA512a76e24a4f838b11358287e275e8a9d9da828acccc42f8798210e7fd17d7d8cdaf3328a83da99220ec836c484a17c9dcd48e31fecff2448b47e4f50b444c055b0