Analysis
-
max time kernel
151s -
max time network
126s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
19-04-2022 12:54
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Invoice.xls
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
Payment_Invoice.xls
Resource
win10v2004-20220414-en
General
-
Target
Payment_Invoice.xls
-
Size
473KB
-
MD5
bb2e7e44ba95cb90cbb138fcbadaac3d
-
SHA1
450f9c1101e66affdd6f28e0f8a369f1b6d86f9b
-
SHA256
5e7ddcc8aa2977cceac204ed424e05270874e2b0da94eb5b056e968126fc9902
-
SHA512
b087b074198e50f87d570ad8f8a45fbe2237a7088e8f96e8dad02db4a9f1e9a5997ace053b1777a529dcde6e28de2868af83ac11cbfd866fb4d7d6ce28ea8b25
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
AsyncClient.exepid process 752 AsyncClient.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4124 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE -
Modifies registry class 2 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1809750270-3141839489-3074374771-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff EXCEL.EXE -
NTFS ADS 1 IoCs
Processes:
EXCEL.EXEdescription ioc process File opened for modification C:\Users\Admin\AppData\Local\Temp\{F79233CC-AAE7-4486-937F-2D877C4D24D0}\AsyncClient.exe:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 460 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
AsyncClient.exedescription pid process Token: SeDebugPrivilege 752 AsyncClient.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE 460 EXCEL.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
EXCEL.EXEAsyncClient.exedescription pid process target process PID 460 wrote to memory of 752 460 EXCEL.EXE AsyncClient.exe PID 460 wrote to memory of 752 460 EXCEL.EXE AsyncClient.exe PID 460 wrote to memory of 752 460 EXCEL.EXE AsyncClient.exe PID 752 wrote to memory of 4124 752 AsyncClient.exe timeout.exe PID 752 wrote to memory of 4124 752 AsyncClient.exe timeout.exe PID 752 wrote to memory of 4124 752 AsyncClient.exe timeout.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment_Invoice.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\AsyncClient.exe"C:\Users\Admin\AppData\Local\AsyncClient.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\timeout.exetimeout3⤵
- Delays execution with timeout.exe
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\AsyncClient.exeFilesize
382KB
MD5120e11300c537b3f627f58294e9dec48
SHA1b51e6df331358cb1ea81833049e3b736763760b4
SHA256c8337902f1e43092f1abeff4e20d1543cb581566c70f31165b88974b90cda8f6
SHA512143d034d79d348a9099a0504c3c92c18a4fd7ce1622de51ee55e28bc51ab1785a69450cce7defc90acc620125d07ed85a4372edc09ae7dc41ad940900e74fc88
-
C:\Users\Admin\AppData\Local\AsyncClient.exeFilesize
382KB
MD5120e11300c537b3f627f58294e9dec48
SHA1b51e6df331358cb1ea81833049e3b736763760b4
SHA256c8337902f1e43092f1abeff4e20d1543cb581566c70f31165b88974b90cda8f6
SHA512143d034d79d348a9099a0504c3c92c18a4fd7ce1622de51ee55e28bc51ab1785a69450cce7defc90acc620125d07ed85a4372edc09ae7dc41ad940900e74fc88
-
memory/460-133-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmpFilesize
64KB
-
memory/460-130-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmpFilesize
64KB
-
memory/460-134-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmpFilesize
64KB
-
memory/460-135-0x00007FFB31F80000-0x00007FFB31F90000-memory.dmpFilesize
64KB
-
memory/460-136-0x00007FFB31F80000-0x00007FFB31F90000-memory.dmpFilesize
64KB
-
memory/460-132-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmpFilesize
64KB
-
memory/460-131-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmpFilesize
64KB
-
memory/752-137-0x0000000000000000-mapping.dmp
-
memory/752-140-0x0000000000460000-0x00000000004C6000-memory.dmpFilesize
408KB
-
memory/752-141-0x0000000004EA0000-0x0000000004F3C000-memory.dmpFilesize
624KB
-
memory/752-142-0x00000000054F0000-0x0000000005A94000-memory.dmpFilesize
5.6MB
-
memory/4124-143-0x0000000000000000-mapping.dmp