Analysis
-
max time kernel
160s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20220331-en -
submitted
04-04-2022 03:32
Behavioral task
behavioral1
Sample
jfbxwvbm.xlsm
Resource
win7-20220331-en
Behavioral task
behavioral2
Sample
jfbxwvbm.xlsm
Resource
win10v2004-20220331-en
General
-
Target
jfbxwvbm.xlsm
-
Size
102KB
-
MD5
e01658f40196c8810a4b654d10212ade
-
SHA1
caed09b776174509351dfe57e87325cacee7c69d
-
SHA256
0d93a4f12d6e52dd86f8194dc522bdf7b6c4724898e929e12943c15cef4f3aa9
-
SHA512
5e502a8d00aa91155e4725323b9f7b073537565a1b185e8a8cce12259b6c7300aebabd8ef776280cecb85b451999742a5bde4ad1a460f12fec0d9c7e7158a666
Malware Config
Extracted
http://singsamut.ac.th/00-----26phj/ws1iGhQ/ws1iGhQ/
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 456 3204 rundll32.exe 80 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3204 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE 3204 EXCEL.EXE -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3204 wrote to memory of 456 3204 EXCEL.EXE 81 PID 3204 wrote to memory of 456 3204 EXCEL.EXE 81 PID 3204 wrote to memory of 456 3204 EXCEL.EXE 81
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\jfbxwvbm.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWow64\rundll32.exeC:\Windows\SysWow64\rundll32.exe ..\bestb.ocx,D"&"l"&"l"&"R"&"eg"&"i"&"s"&"t"&"e"&"rS"&"e"&"rver2⤵
- Process spawned unexpected child process
PID:456
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5a53bdb94c2e74170aff60c9c21beaca1
SHA160718d07daaca89728920ea7ca494622c748ffb5
SHA256dffd3673a67611d35f57a7ebfb422074f257892c42d85c556215762762b5c003
SHA5123a9b43407d8e565e5b872a87ddc637ff2a7cecd304d69125383b89744f5bd2f297462b4bcdd75a45b30d6f4dd1e3103be00c59d5d668eab5889e0499f6bfd9a2