Analysis Overview
SHA256
75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0
Threat Level: Known bad
The file 75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0 was found to be: Known bad.
Malicious Activity Summary
Process spawned unexpected child process
Bazar Loader
Bazar/Team9 Loader payload
Loads dropped DLL
Enumerates system info in registry
Suspicious behavior: AddClipboardFormatListener
Suspicious use of SetWindowsHookEx
Suspicious use of WriteProcessMemory
Checks processor information in registry
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-01-19 09:14
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-01-19 09:14
Reported
2022-01-19 09:17
Platform
win10-en-20211208
Max time kernel
121s
Max time network
132s
Command Line
Signatures
Bazar Loader
Process spawned unexpected child process
| Description | Indicator | Process | Target |
| Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process | N/A | C:\Windows\SYSTEM32\rundll32.exe | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE |
Bazar/Team9 Loader payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Windows\SYSTEM32\rundll32.exe | N/A |
Checks processor information in registry
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Enumerates system info in registry
| Description | Indicator | Process | Target |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key value queried | \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| Key opened | \REGISTRY\MACHINE\Hardware\Description\System\BIOS | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious behavior: AddClipboardFormatListener
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of SetWindowsHookEx
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
| N/A | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2796 wrote to memory of 1944 | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | C:\Windows\SYSTEM32\rundll32.exe |
| PID 2796 wrote to memory of 1944 | N/A | C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE | C:\Windows\SYSTEM32\rundll32.exe |
Processes
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0.xll"
C:\Windows\SYSTEM32\rundll32.exe
rundll32 C:\Users\Admin\JavaObjectReflectB.dll , dopt
Network
| Country | Destination | Domain | Proto |
| US | 52.109.8.19:443 | tcp | |
| US | 52.109.8.19:443 | tcp |
Files
memory/2796-115-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-116-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-117-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-118-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-121-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-128-0x00007FFF786A0000-0x00007FFF786B0000-memory.dmp
memory/2796-129-0x00007FFF786A0000-0x00007FFF786B0000-memory.dmp
\Users\Admin\AppData\Local\Temp\75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0.xll
| MD5 | ae5c387389575adab73f177a746b1f7e |
| SHA1 | b3e56b3dabed8f748d6e94c91c9c2f43fb0ad784 |
| SHA256 | 75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0 |
| SHA512 | 2a45a1094746463274e86bd48bcf40e820a0d4d56fae35d74e493978b9835e7877c42ddde0da5b3bce7df42e49edd64dcd5b243459480c84f4e1149972a950d4 |
\Users\Admin\AppData\Local\Temp\75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0.xll
| MD5 | ae5c387389575adab73f177a746b1f7e |
| SHA1 | b3e56b3dabed8f748d6e94c91c9c2f43fb0ad784 |
| SHA256 | 75cdb51337ba20c2f53bc8dac34e55678cc01b7698550ba91aaa3ce667af32c0 |
| SHA512 | 2a45a1094746463274e86bd48bcf40e820a0d4d56fae35d74e493978b9835e7877c42ddde0da5b3bce7df42e49edd64dcd5b243459480c84f4e1149972a950d4 |
C:\Users\Admin\JavaObjectReflectB.dll
| MD5 | b94afa319617d27b15790ed5f93c20c1 |
| SHA1 | 6e7544592cd4813f86235ce03a9cbfaae2f56454 |
| SHA256 | e79c56fe452f2abeef0a446f20b4bd771b2c68d45e01f540a2162b700a78c6ed |
| SHA512 | 18d728a1cbb4c267e9881645c956d3248f054b731444d38a59de22fb62f2068898d319c0a638e201004fdfbbcbe7396faaa3ea8adde03d393f7bae5e7e6832ec |
\Users\Admin\JavaObjectReflectB.dll
| MD5 | b94afa319617d27b15790ed5f93c20c1 |
| SHA1 | 6e7544592cd4813f86235ce03a9cbfaae2f56454 |
| SHA256 | e79c56fe452f2abeef0a446f20b4bd771b2c68d45e01f540a2162b700a78c6ed |
| SHA512 | 18d728a1cbb4c267e9881645c956d3248f054b731444d38a59de22fb62f2068898d319c0a638e201004fdfbbcbe7396faaa3ea8adde03d393f7bae5e7e6832ec |
memory/1944-259-0x0000000180000000-0x000000018003C000-memory.dmp
memory/2796-281-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-282-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-283-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp
memory/2796-284-0x00007FFF7B1F0000-0x00007FFF7B200000-memory.dmp