Overview
overview
10Static
static
10PKSJ Malwa...87.exe
windows7-x64
1PKSJ Malwa...87.exe
windows10-2004-x64
3PKSJ Malwa...4d.exe
windows7-x64
8PKSJ Malwa...4d.exe
windows10-2004-x64
8PKSJ Malwa...c9.xls
windows7-x64
10PKSJ Malwa...c9.xls
windows10-2004-x64
10PKSJ Malwa...f9.doc
windows7-x64
10PKSJ Malwa...f9.doc
windows10-2004-x64
10PKSJ Malwa...30.pdf
windows7-x64
1PKSJ Malwa...30.pdf
windows10-2004-x64
1PKSJ Malwa...8d.exe
windows7-x64
1PKSJ Malwa...8d.exe
windows10-2004-x64
1PKSJ Malwa...fa.exe
windows7-x64
1PKSJ Malwa...fa.exe
windows10-2004-x64
3PKSJ Malwa...c8.doc
windows7-x64
10PKSJ Malwa...c8.doc
windows10-2004-x64
10PKSJ Malwa...03.doc
windows7-x64
1PKSJ Malwa...03.doc
windows10-2004-x64
1PKSJ Malwa...40.pdf
windows7-x64
1PKSJ Malwa...40.pdf
windows10-2004-x64
1PKSJ Malwa...4e.doc
windows7-x64
1PKSJ Malwa...4e.doc
windows10-2004-x64
1PKSJ Malwa...cd.pdf
windows7-x64
1PKSJ Malwa...cd.pdf
windows10-2004-x64
1PKSJ Malwa...7b.exe
windows7-x64
10PKSJ Malwa...7b.exe
windows10-2004-x64
10PKSJ Malwa...82.exe
windows7-x64
1PKSJ Malwa...82.exe
windows10-2004-x64
3PKSJ Malwa...6f.doc
windows7-x64
10PKSJ Malwa...6f.doc
windows10-2004-x64
10PKSJ Malwa...d2.doc
windows7-x64
1PKSJ Malwa...d2.doc
windows10-2004-x64
1Analysis
-
max time kernel
107s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-10-2022 06:08
Behavioral task
behavioral1
Sample
PKSJ Malware/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
PKSJ Malware/1/VirusShare_0a2d1ecedf3f79754aa2c18d62e75287.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
PKSJ Malware/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
PKSJ Malware/1/VirusShare_0aee78510c46e3a200b6bc21ac1c954d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
PKSJ Malware/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
PKSJ Malware/1/VirusShare_1ba8249d8503c0cf7bc125588c43bef9.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral9
Sample
PKSJ Malware/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win7-20220812-en
Behavioral task
behavioral10
Sample
PKSJ Malware/1/VirusShare_3cd9a967b67fe69351e390195ca7a430.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral11
Sample
PKSJ Malware/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win7-20220812-en
Behavioral task
behavioral12
Sample
PKSJ Malware/2/VirusShare_01b55404de50bd1a56343b2f316ff88d.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral13
Sample
PKSJ Malware/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win7-20220812-en
Behavioral task
behavioral14
Sample
PKSJ Malware/2/VirusShare_1ad9a67240d5775395c45b64dd6529fa.exe
Resource
win10v2004-20220901-en
Behavioral task
behavioral15
Sample
PKSJ Malware/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win7-20220812-en
Behavioral task
behavioral16
Sample
PKSJ Malware/2/VirusShare_2fe5b00079aec2d8369a798230313ec8.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral17
Sample
PKSJ Malware/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win7-20220901-en
Behavioral task
behavioral18
Sample
PKSJ Malware/2/VirusShare_3f0b1eed4b7b9ae05fab4d949843f103.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral19
Sample
PKSJ Malware/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win7-20220812-en
Behavioral task
behavioral20
Sample
PKSJ Malware/2/VirusShare_480ef02bb062a57724e1b3e14532a140.pdf
Resource
win10v2004-20220901-en
Behavioral task
behavioral21
Sample
PKSJ Malware/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win7-20220812-en
Behavioral task
behavioral22
Sample
PKSJ Malware/3/VirusShare_3fb34964fa7b8c6bfad8d960380ff04e.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral23
Sample
PKSJ Malware/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win7-20220812-en
Behavioral task
behavioral24
Sample
PKSJ Malware/3/VirusShare_4675e87be15585e66b0c88b833dd9ecd.pdf
Resource
win10v2004-20220812-en
Behavioral task
behavioral25
Sample
PKSJ Malware/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win7-20220901-en
Behavioral task
behavioral26
Sample
PKSJ Malware/3/VirusShare_4aa5734fe9c86184f931f4ddaf2d4d7b.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral27
Sample
PKSJ Malware/3/VirusShare_5c8b670c503455baafbff400a446cf82.exe
Resource
win7-20220812-en
Behavioral task
behavioral28
Sample
PKSJ Malware/3/VirusShare_5c8b670c503455baafbff400a446cf82.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral29
Sample
PKSJ Malware/3/VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc
Resource
win7-20220901-en
Behavioral task
behavioral30
Sample
PKSJ Malware/3/VirusShare_6ad036ba93c94d6976e2d93c7a3aec6f.doc
Resource
win10v2004-20220812-en
Behavioral task
behavioral31
Sample
PKSJ Malware/4/VirusShare_4b8eb7fe75f72c1c5c1f80af9cd165d2.doc
Resource
win7-20220812-en
Behavioral task
behavioral32
Sample
PKSJ Malware/4/VirusShare_4b8eb7fe75f72c1c5c1f80af9cd165d2.doc
Resource
win10v2004-20220812-en
General
-
Target
PKSJ Malware/1/VirusShare_0fea640a7da27f365b3675f73626b9c9.xls
-
Size
937KB
-
MD5
0fea640a7da27f365b3675f73626b9c9
-
SHA1
fd4825f244e9c145486cb6930ad05695b9972668
-
SHA256
64af94592f6707505fa6f42b58776c3635706a414e6362a92f707df84627679c
-
SHA512
c9a10288762f3f5a3fdff17f8dd8560e7a884f1b83f405c2e85c6c86e42f69a30841c13aa0f2ecfc55aed42995d7aeb8fe40415e423ed0a306d2e7d00883dfbf
-
SSDEEP
24576:h3zS0aqbCrxgFhFSQVB5DjDLG6/8otVBTN9s:K9Fo5VLDLGwTBT
Malware Config
Extracted
Signatures
-
TA505
Cybercrime group active since 2015, responsible for families like Dridex and Locky.
-
Processes:
resource yara_rule behavioral5/memory/1048-100-0x0000000010000000-0x0000000010053000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
EXCEL.EXEpid process 1048 EXCEL.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF}\ = "Controls" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcList" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8BD21D33-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{47FF8FE8-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents9" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{5512D123-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSelect" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074}\ = "IReturnSingle" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{8BD21D13-EC42-11CE-9E0D-00AA006002F3}\ = "IMdcText" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AB4C4EEA-896D-4F72-9A68-68DB7D5928DE}\2.0\HELPDIR\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\VBE" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{5512D119-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLOption" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\TypeLib\{AB4C4EEA-896D-4F72-9A68-68DB7D5928DE}\2.0\0\win32 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{29B86A70-F52E-11CE-9BCE-00AA00608E01} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{5512D111-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLSubmitButton" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{7B020EC1-AF6C-11CE-9F46-00AA00574A4F}\ = "CommandButtonEvents" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon\ = "\"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AB4C4EEA-896D-4F72-9A68-68DB7D5928DE}\2.0\0 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{04598FC6-866C-11CF-AB7C-00AA00C08FCF}\ = "IControl" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{A38BFFC3-A5A0-11CE-8107-00AA00611080} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{47FF8FE1-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{82B02371-B5BC-11CF-810F-00A0C9030074} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{79176FB2-B7F2-11CE-97EF-00AA006D2776}\ = "SpinbuttonEvents" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{82B02370-B5BC-11CF-810F-00A0C9030074} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8BD21D62-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{4C5992A5-6926-101B-9992-00000B65C6F9}\ = "ImageEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8BD21D23-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{5512D115-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{BEF6E003-A874-101A-8BBA-00AA00300CAB} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8A683C90-BA84-11CF-8110-00A0C9030074} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{7B020EC2-AF6C-11CE-9F46-00AA00574A4F}\ = "ScrollbarEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{04598FC7-866C-11CF-AB7C-00AA00C08FCF} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{9A4BBF53-4E46-101B-8BBD-00AA003E3B29}\ = "ControlEvents" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{4C599243-6926-101B-9992-00000B65C6F9} EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{04598FC8-866C-11CF-AB7C-00AA00C08FCF}\ = "_UserForm" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8BD21D32-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{7B020EC7-AF6C-11CE-9F46-00AA00574A4F} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{47FF8FE2-6198-11CF-8CE8-00AA006CB389}\ = "WHTMLControlEvents3" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{5512D113-5CC6-11CF-8D67-00AA00BDCE1D} EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{8BD21D63-EC42-11CE-9E0D-00AA006002F3} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{5512D11B-5CC6-11CF-8D67-00AA00BDCE1D}\ = "IWHTMLText" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Wow6432Node\Interface\{47FF8FE0-6198-11CF-8CE8-00AA006CB389} EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{92E11A03-7358-11CE-80CB-00AA00611080} EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{04598FC9-866C-11CF-AB7C-00AA00C08FCF}\ = "IMultiPage" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{AB4C4EEA-896D-4F72-9A68-68DB7D5928DE}\2.0 EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000_CLASSES\Interface\{82B02372-B5BC-11CF-810F-00A0C9030074}\ = "IReturnString" EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1048 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
EXCEL.EXEpid process 1048 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 3 IoCs
Processes:
EXCEL.EXEpid process 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
EXCEL.EXEpid process 1048 EXCEL.EXE 1048 EXCEL.EXE 1048 EXCEL.EXE
Processes
-
C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\PKSJ Malware\1\VirusShare_0fea640a7da27f365b3675f73626b9c9.xls"1⤵
- Loads dropped DLL
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\contract_.dllFilesize
328KB
MD52b111f00ad27acb2e312c693e9901f54
SHA13af7391cb25b2ebcab1c5b014a61af7d4b718f1a
SHA25690517af7a1a1a468bea6ea125f2f32ba021bfaa9593fda800067e1a47bc2228a
SHA51273a022859d1874e57e51ed7780a656f3ee66cb9ddd14749adbe31f2e45c06af99b33ac465dfdb8ff32588d8f159e81682fb08721480a3b4e927d186c1e05cf78
-
memory/1048-68-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-101-0x0000000072A5D000-0x0000000072A68000-memory.dmpFilesize
44KB
-
memory/1048-57-0x0000000072A5D000-0x0000000072A68000-memory.dmpFilesize
44KB
-
memory/1048-58-0x0000000076171000-0x0000000076173000-memory.dmpFilesize
8KB
-
memory/1048-59-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-60-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-61-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-62-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-63-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-64-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-65-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-66-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-103-0x0000000072A5D000-0x0000000072A68000-memory.dmpFilesize
44KB
-
memory/1048-56-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1048-78-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-75-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-76-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-77-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-69-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-79-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-83-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-89-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-95-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB
-
memory/1048-55-0x0000000071A71000-0x0000000071A73000-memory.dmpFilesize
8KB
-
memory/1048-100-0x0000000010000000-0x0000000010053000-memory.dmpFilesize
332KB
-
memory/1048-54-0x000000002F8B1000-0x000000002F8B4000-memory.dmpFilesize
12KB
-
memory/1048-102-0x000000005FFF0000-0x0000000060000000-memory.dmpFilesize
64KB
-
memory/1048-67-0x000000000069A000-0x000000000069E000-memory.dmpFilesize
16KB