Analysis
-
max time kernel
153s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
08-05-2022 19:29
Static task
static1
Behavioral task
behavioral1
Sample
ApplicationReject-887252173.xlsb
Resource
win7-20220414-en
General
-
Target
ApplicationReject-887252173.xlsb
-
Size
1.1MB
-
MD5
b112fd7df986e3d613d78e630d3344e9
-
SHA1
fba85b4bd2447de4a9b1a36fced6aaafd40bcfa5
-
SHA256
66cd7db8994d7413e27ea4f3b1730e6e35e5deb0f2e2adebef9ae996edc61d20
-
SHA512
1d6ab3e12c42c5948091be2ca79410228b88c377b05a4144acde44e7b15bf15a4a8aa6e7dc6e66cf58096f92bc56c2f690c7fed8b9f9bc809f62e309add7e7c9
Malware Config
Extracted
http://103.155.93.53/975035438.dat
http://87.236.146.69/975035438.dat
http://94.140.114.172/975035438.dat
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
Regsvr32.exeRegsvr32.exeRegsvr32.exeRegsvr32.exedescription pid pid_target process target process Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1620 872 Regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1644 872 Regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 556 872 Regsvr32.exe EXCEL.EXE Parent C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1568 872 Regsvr32.exe EXCEL.EXE -
Downloads MZ/PE file
-
Loads dropped DLL 1 IoCs
Processes:
Regsvr32.exepid process 1568 Regsvr32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 872 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 872 EXCEL.EXE 872 EXCEL.EXE 872 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1620 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1644 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 556 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe PID 872 wrote to memory of 1568 872 EXCEL.EXE Regsvr32.exe
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\ApplicationReject-887252173.xlsb1⤵
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 /s calc2⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 C:\Rujiky\Ubada\Vertu.ooccxx2⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 C:\Rujiky\Ubada\Vertua.ooccxx2⤵
- Process spawned unexpected child process
-
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 C:\Rujiky\Ubada\Vertub.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Rujiky\Ubada\Vertub.ooccxxFilesize
962KB
MD5b5de1af72fcdf348d2ef43e01ce3eaec
SHA1d61a2809574fc84e953e04b320417eb88c4c87d0
SHA25653ca9767b35e0f3a1a77623f8368a5ecee9aa4b1f9c295ae5416fa5cbd923190
SHA5124b1cd98e82e6c66ad84cd6e595522d0a7420f837da5bcad3feaed10e4febcb4e48d8873277f8dd25e6772cea1a83ddf59b333de21a814ffc0f2751fa9b26362c
-
\Rujiky\Ubada\Vertub.ooccxxFilesize
962KB
MD5b5de1af72fcdf348d2ef43e01ce3eaec
SHA1d61a2809574fc84e953e04b320417eb88c4c87d0
SHA25653ca9767b35e0f3a1a77623f8368a5ecee9aa4b1f9c295ae5416fa5cbd923190
SHA5124b1cd98e82e6c66ad84cd6e595522d0a7420f837da5bcad3feaed10e4febcb4e48d8873277f8dd25e6772cea1a83ddf59b333de21a814ffc0f2751fa9b26362c
-
memory/556-63-0x0000000000000000-mapping.dmp
-
memory/872-54-0x000000002F761000-0x000000002F764000-memory.dmpFilesize
12KB
-
memory/872-55-0x0000000071391000-0x0000000071393000-memory.dmpFilesize
8KB
-
memory/872-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/872-57-0x00000000764C1000-0x00000000764C3000-memory.dmpFilesize
8KB
-
memory/872-58-0x000000007237D000-0x0000000072388000-memory.dmpFilesize
44KB
-
memory/1568-65-0x0000000000000000-mapping.dmp
-
memory/1620-59-0x0000000000000000-mapping.dmp
-
memory/1644-61-0x0000000000000000-mapping.dmp