Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14-05-2022 14:01

General

  • Target

    2226726056.xlsb

  • Size

    1.0MB

  • MD5

    58e873b384743f67dce82012e7215a99

  • SHA1

    2c89b1b4ec71da38747ce550fdbd3c08da28ca16

  • SHA256

    2ffaa815fc7b7b08d66842936025274d08ddbbd38a8478205fed86ece8848650

  • SHA512

    312b2aeea61ee6c0d10acae9c163095c8ef0f56953f4ad15350eee82023f6ce4612c17f89fb46e37a920e8b260ba3fc54d6d12c20b1d36ef468f99da4742ab71

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://23.227.199.109/44695.6679987269.dat

xlm40.dropper

http://77.91.101.69/44695.6679987269.dat

xlm40.dropper

http://94.140.114.226/44695.6679987269.dat

Signatures

  • Process spawned unexpected child process 5 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2226726056.xlsb"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4200
    • C:\Windows\SYSTEM32\Regsvr32.exe
      Regsvr32 /s calc
      2⤵
      • Process spawned unexpected child process
      PID:3440
    • C:\Windows\SYSTEM32\Regsvr32.exe
      Regsvr32 C:\ProgramData\Teris.OOOCCCXXX
      2⤵
      • Process spawned unexpected child process
      PID:3840
    • C:\Windows\SYSTEM32\Regsvr32.exe
      Regsvr32 C:\ProgramData\Terisa.OOOCCCXXX
      2⤵
      • Process spawned unexpected child process
      PID:4416
    • C:\Windows\SYSTEM32\Regsvr32.exe
      Regsvr32 C:\ProgramData\Terisb.OOOCCCXXX
      2⤵
      • Process spawned unexpected child process
      PID:3852
    • C:\Windows\SYSTEM32\Regsvr32.exe
      Regsvr32 /s calc
      2⤵
      • Process spawned unexpected child process
      PID:1408

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1408-141-0x0000000000000000-mapping.dmp
  • memory/3440-137-0x0000000000000000-mapping.dmp
  • memory/3840-138-0x0000000000000000-mapping.dmp
  • memory/3852-140-0x0000000000000000-mapping.dmp
  • memory/4200-130-0x00007FFDAE3F0000-0x00007FFDAE400000-memory.dmp
    Filesize

    64KB

  • memory/4200-131-0x00007FFDAE3F0000-0x00007FFDAE400000-memory.dmp
    Filesize

    64KB

  • memory/4200-132-0x00007FFDAE3F0000-0x00007FFDAE400000-memory.dmp
    Filesize

    64KB

  • memory/4200-133-0x00007FFDAE3F0000-0x00007FFDAE400000-memory.dmp
    Filesize

    64KB

  • memory/4200-134-0x00007FFDAE3F0000-0x00007FFDAE400000-memory.dmp
    Filesize

    64KB

  • memory/4200-135-0x00007FFDAC1E0000-0x00007FFDAC1F0000-memory.dmp
    Filesize

    64KB

  • memory/4200-136-0x00007FFDAC1E0000-0x00007FFDAC1F0000-memory.dmp
    Filesize

    64KB

  • memory/4416-139-0x0000000000000000-mapping.dmp