Analysis
-
max time kernel
4265098s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
14/01/2022, 16:16
Behavioral task
behavioral1
Sample
25031893-833908.xlsm
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
25031893-833908.xlsm
Resource
win10v2004-en-20220113
General
-
Target
25031893-833908.xlsm
-
Size
83KB
-
MD5
a19739c3b8b42e530b0c39885a7eb572
-
SHA1
034d7b56335bc65f1010c24801f40f739f981418
-
SHA256
689555499fd2dff9a85acca987cf63ecb004150fb9428e7336b11a90eed8a4a6
-
SHA512
30cda33c13a7c5cbee38fc74846b6263ca20efc53434577855032e59f1e4376675d9f46b804e61964713d91fe7af8f9bcd3ffe010ebeec4461e45c38ea6c7238
Malware Config
Extracted
http://therecyclingmachine.com/wp-admin/LzpOZSlkq90fYT1/
http://zhongmaifangwu.com/TEST777/3U4Un0u/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2000 1536 rundll32.exe 54 -
Blocklisted process makes network request 2 IoCs
flow pid Process 54 736 rundll32.exe 55 736 rundll32.exe -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 2000 rundll32.exe 3404 rundll32.exe 3988 rundll32.exe 736 rundll32.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Nyrxxjjgqiq\duixdulbk.hku rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1536 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 736 rundll32.exe 736 rundll32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE 1536 EXCEL.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1536 wrote to memory of 2000 1536 EXCEL.EXE 61 PID 1536 wrote to memory of 2000 1536 EXCEL.EXE 61 PID 1536 wrote to memory of 2000 1536 EXCEL.EXE 61 PID 2000 wrote to memory of 3404 2000 rundll32.exe 62 PID 2000 wrote to memory of 3404 2000 rundll32.exe 62 PID 2000 wrote to memory of 3404 2000 rundll32.exe 62 PID 3404 wrote to memory of 3988 3404 rundll32.exe 63 PID 3404 wrote to memory of 3988 3404 rundll32.exe 63 PID 3404 wrote to memory of 3988 3404 rundll32.exe 63 PID 3988 wrote to memory of 736 3988 rundll32.exe 64 PID 3988 wrote to memory of 736 3988 rundll32.exe 64 PID 3988 wrote to memory of 736 3988 rundll32.exe 64
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\25031893-833908.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\erum.ocx,D"&"l"&"lR"&"egister"&"Serve"&"r2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Users\Admin\erum.ocx",DllRegisterServer3⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\SysWOW64\Nyrxxjjgqiq\duixdulbk.hku",CtJWWIJGiBlb4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\SysWOW64\rundll32.exe "C:\Windows\System32\Nyrxxjjgqiq\duixdulbk.hku",DllRegisterServer5⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:736
-
-
-
-