Analysis
-
max time kernel
150s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
09-05-2022 22:06
Behavioral task
behavioral1
Sample
Cancellation-1617961783$-May5.xlsb
Resource
win7-20220414-en
General
-
Target
Cancellation-1617961783$-May5.xlsb
-
Size
65KB
-
MD5
50b9d40af63502d875146f3534b3fdcd
-
SHA1
fd9310a452b43d05bb59b141f31dae7ca86a6c60
-
SHA256
21af29b0997577c1bb039c379e50372ad7df0b1d36a33bc8528489d24abb3858
-
SHA512
c18a245cfc03328a8af11ed09cf6b51ea99d292fd135cd81d569020fea8f4f2c42599476f6b9e6f8804ce22ea29f2b52d762c83ceb1deaf3730268adc6b38608
Malware Config
Extracted
Extracted
qakbot
403.683
obama182
1651756499
103.107.113.120:443
80.11.74.81:2222
177.102.2.175:32101
24.178.196.158:2222
91.177.173.10:995
181.208.248.227:443
176.67.56.94:443
202.134.152.2:2222
148.0.57.85:443
179.179.162.9:993
40.134.246.185:995
37.186.54.254:995
196.203.37.215:80
120.150.218.241:995
208.107.221.224:443
113.53.151.59:443
70.46.220.114:443
69.14.172.24:443
108.60.213.141:443
24.55.67.176:443
74.14.7.71:2222
103.246.242.202:443
172.115.177.204:2222
24.152.219.253:995
197.83.230.61:443
38.70.253.226:2222
217.165.84.177:993
118.161.34.21:443
194.36.28.102:443
32.221.224.140:995
39.33.170.57:995
81.215.196.174:443
24.139.72.117:443
113.110.253.185:995
187.207.47.198:61202
203.122.46.130:443
79.129.121.68:995
140.82.49.12:443
47.23.89.62:993
86.132.13.91:2078
75.99.168.194:443
41.228.22.180:443
148.64.96.100:443
2.50.4.57:443
67.209.195.198:443
217.128.122.65:2222
5.32.41.45:443
179.158.105.44:443
46.107.48.202:443
183.82.103.213:443
103.139.243.207:990
72.76.94.99:443
76.70.9.169:2222
93.48.80.198:995
82.152.39.39:443
2.34.12.8:443
92.132.172.197:2222
75.99.168.194:61201
89.86.33.217:443
88.228.251.169:443
120.61.3.169:443
85.246.82.244:443
89.211.182.31:2222
103.87.95.133:2222
173.174.216.62:443
86.98.208.214:2222
174.69.215.101:443
89.101.97.139:443
63.143.92.99:995
37.34.253.233:443
86.195.158.178:2222
144.202.3.39:995
144.202.2.175:995
45.63.1.12:443
149.28.238.199:443
140.82.63.183:995
144.202.3.39:443
140.82.63.183:443
45.63.1.12:995
149.28.238.199:995
144.202.2.175:443
45.76.167.26:443
45.76.167.26:995
94.36.195.102:2222
141.237.86.114:995
118.161.34.21:995
105.99.204.185:443
90.120.65.153:2078
2.50.17.128:2222
58.105.167.36:50000
189.146.78.175:443
104.34.212.7:32103
76.25.142.196:443
173.21.10.71:2222
73.151.236.31:443
67.165.206.193:993
45.46.53.140:2222
191.99.191.28:443
180.129.20.164:995
149.135.101.20:443
31.35.28.29:443
187.208.0.99:443
201.142.133.198:443
82.41.63.217:443
201.172.23.68:2222
72.252.157.172:990
190.252.242.69:443
70.51.152.61:2222
217.118.46.41:2222
72.252.157.172:995
5.193.104.246:2222
100.1.108.246:443
187.102.135.141:2222
47.156.191.217:443
2.191.231.178:443
109.12.111.14:443
41.215.151.247:995
103.157.122.130:21
96.37.113.36:993
186.64.67.8:443
67.69.166.79:2222
121.74.167.191:995
190.36.233.41:2222
68.204.7.158:443
197.94.84.67:443
106.51.48.170:50001
72.66.116.235:995
72.12.115.78:22
103.139.243.207:993
89.137.52.44:443
191.34.199.46:443
98.50.191.202:443
96.45.66.216:61202
102.182.232.3:995
84.241.8.23:32103
172.114.160.81:995
217.164.117.87:1194
45.9.20.200:443
47.23.89.62:995
187.172.191.97:443
24.43.99.75:443
103.88.226.30:443
182.191.92.203:995
39.44.144.64:995
45.241.254.110:993
39.57.56.19:995
121.7.223.59:2222
94.140.8.55:2222
172.114.160.81:443
39.49.69.112:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exeregsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4600 4948 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 112 4948 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1220 4948 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1728 4948 regsvr32.exe EXCEL.EXE -
Downloads MZ/PE file
-
Loads dropped DLL 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 116 regsvr32.exe 1332 regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies data under HKEY_USERS 10 IoCs
Processes:
explorer.exedescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\d4cfff66 = 499929d92f5668a9d87b51ee0f388dde44ec34b24ae59a30483b0ed1e539d52eed0de48b9351cf2f64a793bac4d301c538646a07e9131e4ca0b13d8624c500d5d9a63d1be06802fad201435ffcc32a8505a835dfeeaa4fc1e1cc05b662dae71888d41ad27f02848dae explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\a9c7b0ec = 79c1ed3195b1beb3fc96906238d349896395db141ea34b78fda03e39e31b37912792959417c9b7efda2771e448736758c30da0b70d2f78300f1c67ca2c5f0d43cce89358a4dca5a83ee63e9954695f8ee35980ae5ebb70defa0dc387b1811ef14037b7d5513006bf explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\d68edf1a = 995c46e32246940565dff212ff13274485 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\5bad6831 = e75676f17a9f0172ca5ada7b1ed8c007d7033ed63e6c6d4fa34012c8cd2b32c5cf181008cde372d0acd558f017ccdf0486e107b16aa07dec77d2efd946a8e29d970859746017ce3a84bfd83b556db2be579f969e32ba7736f6b326f0f35550 explorer.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\6c739803 = 8616c3ec44c26b9a16615d06851696c00ed20965a07be7377965d0035016de97969ea5263acc609cc6e39657409a4e55874a114e39f4f3ca475bbd2ea98f323882fcde9b5d3e9451 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\117bd789 = 6c8d437d0f633fe8290d2564232d59f083e6cbcd56bf1823af0231fe290f4a11992ff80865e33a5b7d36f8cbfc30e88e42984067010b17cbae4284e4a77802d2b804f3c73e4a976121 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\24e407c7 = dba3e44e49c0952f606a570be95490da10e7c8a2f2cc46b86d4c5fc20d22652cba807cd248e019077154ceb2207fc0d95b957ac0f5415bac288322ad9825e716bfc6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\5bad6831 = e75661f17a9f342e59adeebff2f5ebf72105835fe7e6b644e1ea08da5093014d2a83df5743ddeecffce510e16238a42fbe6941b30b91c3438b0b2a29efee4eb8edd4aa56987322fcb4e6 explorer.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Fjlvtujrdpywzk\6e32b87f = 8fdcade71f42dd6987793e2d5148d1be1f64e20d809d49aadaf523f1d3a64dbd40920d2d6745518bae086e20adf66e2fd22e3fe6d0f3ab0320cc1c676352003303dbf44f9e4b4675a0f283472e410e32fe51d63afbee9c20de70a7361b1954e78936f797563361dcd33ff2027803a122fd8deef26d2e229db52791e82aa6603ec54f584d5753ab1278d412b00022917bd6c021a3233efe3c84267f63f8519e5b4b269b7f60c5aac7f7ec9db21e12fba8cf9d6f explorer.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4948 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
regsvr32.exeexplorer.exepid process 116 regsvr32.exe 116 regsvr32.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe 1572 explorer.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
Processes:
regsvr32.exeregsvr32.exepid process 116 regsvr32.exe 1332 regsvr32.exe -
Suspicious use of SetWindowsHookEx 17 IoCs
Processes:
EXCEL.EXEpid process 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE 4948 EXCEL.EXE -
Suspicious use of WriteProcessMemory 31 IoCs
Processes:
EXCEL.EXEregsvr32.exeregsvr32.exeexplorer.exeregsvr32.exeregsvr32.exeexplorer.exedescription pid process target process PID 4948 wrote to memory of 4600 4948 EXCEL.EXE regsvr32.exe PID 4948 wrote to memory of 4600 4948 EXCEL.EXE regsvr32.exe PID 4948 wrote to memory of 112 4948 EXCEL.EXE regsvr32.exe PID 4948 wrote to memory of 112 4948 EXCEL.EXE regsvr32.exe PID 112 wrote to memory of 116 112 regsvr32.exe regsvr32.exe PID 112 wrote to memory of 116 112 regsvr32.exe regsvr32.exe PID 112 wrote to memory of 116 112 regsvr32.exe regsvr32.exe PID 116 wrote to memory of 1572 116 regsvr32.exe explorer.exe PID 116 wrote to memory of 1572 116 regsvr32.exe explorer.exe PID 116 wrote to memory of 1572 116 regsvr32.exe explorer.exe PID 116 wrote to memory of 1572 116 regsvr32.exe explorer.exe PID 116 wrote to memory of 1572 116 regsvr32.exe explorer.exe PID 4948 wrote to memory of 1220 4948 EXCEL.EXE regsvr32.exe PID 4948 wrote to memory of 1220 4948 EXCEL.EXE regsvr32.exe PID 4948 wrote to memory of 1728 4948 EXCEL.EXE regsvr32.exe PID 4948 wrote to memory of 1728 4948 EXCEL.EXE regsvr32.exe PID 1572 wrote to memory of 4588 1572 explorer.exe schtasks.exe PID 1572 wrote to memory of 4588 1572 explorer.exe schtasks.exe PID 1572 wrote to memory of 4588 1572 explorer.exe schtasks.exe PID 4076 wrote to memory of 1332 4076 regsvr32.exe regsvr32.exe PID 4076 wrote to memory of 1332 4076 regsvr32.exe regsvr32.exe PID 4076 wrote to memory of 1332 4076 regsvr32.exe regsvr32.exe PID 1332 wrote to memory of 968 1332 regsvr32.exe explorer.exe PID 1332 wrote to memory of 968 1332 regsvr32.exe explorer.exe PID 1332 wrote to memory of 968 1332 regsvr32.exe explorer.exe PID 1332 wrote to memory of 968 1332 regsvr32.exe explorer.exe PID 1332 wrote to memory of 968 1332 regsvr32.exe explorer.exe PID 968 wrote to memory of 4160 968 explorer.exe reg.exe PID 968 wrote to memory of 4160 968 explorer.exe reg.exe PID 968 wrote to memory of 1180 968 explorer.exe reg.exe PID 968 wrote to memory of 1180 968 explorer.exe reg.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Cancellation-1617961783$-May5.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s calc2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Merto\Byrost\Veonse.OOOCCCXXX2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exeC:\Merto\Byrost\Veonse.OOOCCCXXX3⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn sfmltkkjw /tr "regsvr32.exe -s \"C:\Merto\Byrost\Veonse.OOOCCCXXX\"" /SC ONCE /Z /ST 00:09 /ET 00:215⤵
- Creates scheduled task(s)
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Merto\Byrost\Veonsea.OOOCCCXXX2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 C:\Merto\Byrost\Veonseb.OOOCCCXXX2⤵
- Process spawned unexpected child process
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k appmodel -p -s camsvc1⤵
-
C:\Windows\system32\regsvr32.exeregsvr32.exe -s "C:\Merto\Byrost\Veonse.OOOCCCXXX"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\regsvr32.exe-s "C:\Merto\Byrost\Veonse.OOOCCCXXX"2⤵
- Loads dropped DLL
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe3⤵
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\ProgramData\Microsoft\Eyavomjpki" /d "0"4⤵
-
C:\Windows\system32\reg.exeC:\Windows\system32\reg.exe ADD "HKLM\SOFTWARE\Microsoft\Windows Defender\Exclusions\Paths" /f /t REG_DWORD /v "C:\Users\Admin\AppData\Roaming\Microsoft\Tnpofi" /d "0"4⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD5b421410d6c08a39d6dd94dd4c6435b23
SHA1e4bc64093485ebd412ce61d7d811c4a234867025
SHA256b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99
SHA51203b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD5b421410d6c08a39d6dd94dd4c6435b23
SHA1e4bc64093485ebd412ce61d7d811c4a234867025
SHA256b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99
SHA51203b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD5b421410d6c08a39d6dd94dd4c6435b23
SHA1e4bc64093485ebd412ce61d7d811c4a234867025
SHA256b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99
SHA51203b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d
-
C:\Merto\Byrost\Veonse.OOOCCCXXXFilesize
855KB
MD5b421410d6c08a39d6dd94dd4c6435b23
SHA1e4bc64093485ebd412ce61d7d811c4a234867025
SHA256b85c3695c3ab9d5b02cface05ecc9b45da33bb26d4186ea2c6e485689c5b8f99
SHA51203b76fb7d72be88c0c843839383fdbe7a25535af026b1ee8797c1958255190aae3308e5a74359be7225964ec02139a0f66d715900590ccd8c1320d8187ea6e8d
-
memory/112-138-0x0000000000000000-mapping.dmp
-
memory/116-142-0x0000000002DE0000-0x0000000002E02000-memory.dmpFilesize
136KB
-
memory/116-143-0x0000000002D90000-0x0000000002DB2000-memory.dmpFilesize
136KB
-
memory/116-140-0x0000000000000000-mapping.dmp
-
memory/116-144-0x0000000002DE0000-0x0000000002E02000-memory.dmpFilesize
136KB
-
memory/968-156-0x0000000000000000-mapping.dmp
-
memory/968-159-0x0000000001240000-0x0000000001262000-memory.dmpFilesize
136KB
-
memory/1180-158-0x0000000000000000-mapping.dmp
-
memory/1220-146-0x0000000000000000-mapping.dmp
-
memory/1332-151-0x0000000000000000-mapping.dmp
-
memory/1332-153-0x0000000001950000-0x0000000001972000-memory.dmpFilesize
136KB
-
memory/1332-155-0x0000000001950000-0x0000000001972000-memory.dmpFilesize
136KB
-
memory/1332-154-0x0000000001900000-0x0000000001922000-memory.dmpFilesize
136KB
-
memory/1572-145-0x0000000000000000-mapping.dmp
-
memory/1572-149-0x0000000001240000-0x0000000001262000-memory.dmpFilesize
136KB
-
memory/1728-147-0x0000000000000000-mapping.dmp
-
memory/4160-157-0x0000000000000000-mapping.dmp
-
memory/4588-148-0x0000000000000000-mapping.dmp
-
memory/4600-137-0x0000000000000000-mapping.dmp
-
memory/4948-134-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmpFilesize
64KB
-
memory/4948-130-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmpFilesize
64KB
-
memory/4948-135-0x00007FFC474A0000-0x00007FFC474B0000-memory.dmpFilesize
64KB
-
memory/4948-133-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmpFilesize
64KB
-
memory/4948-136-0x00007FFC474A0000-0x00007FFC474B0000-memory.dmpFilesize
64KB
-
memory/4948-132-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmpFilesize
64KB
-
memory/4948-131-0x00007FFC49CD0000-0x00007FFC49CE0000-memory.dmpFilesize
64KB