Analysis
-
max time kernel
100s -
max time network
131s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03-11-2022 14:07
Behavioral task
behavioral1
Sample
dd5a2731ea158f234836d90487f79adfae8b93f5b7f847dbb6cd4d766037e46d.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
dd5a2731ea158f234836d90487f79adfae8b93f5b7f847dbb6cd4d766037e46d.xls
Resource
win10-20220812-en
General
-
Target
dd5a2731ea158f234836d90487f79adfae8b93f5b7f847dbb6cd4d766037e46d.xls
-
Size
217KB
-
MD5
c083c71b2b156ae6e42ccd7c0c352c12
-
SHA1
b1dda95b6068715571b73bde920a6eba08335107
-
SHA256
dd5a2731ea158f234836d90487f79adfae8b93f5b7f847dbb6cd4d766037e46d
-
SHA512
94d6f837298c70ccab68bc2fe7d75cc02f1fb238ca28641df27a12b733ce216d2a169143b499faca6f06d4159c2b8963afbc9fa6788752202467c435aa8380cc
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQmt:nbGUMVWlbt
Malware Config
Extracted
http://kabaruntukrakyat.com/wp-content/B9oJ0jh/
http://coinkub.com/wp-content/WwrJvjumS/
https://aberractivity.hu/iqq/Dmtv/
https://anamafegarcia.es/css/HfFXMTXvc40t/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4056 4792 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4756 4792 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1652 4792 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 812 4792 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 4056 regsvr32.exe 4756 regsvr32.exe 1652 regsvr32.exe 812 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NJTvG.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\QIRzNBcJVOwR\\NJTvG.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SwyJ.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VgzFiYCqTKTCziyr\\SwyJ.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fkqw.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\WnviUqesEMr\\fkqw.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sPmncD.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\GLfFrHSD\\sPmncD.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4792 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4056 regsvr32.exe 4056 regsvr32.exe 3524 regsvr32.exe 3524 regsvr32.exe 3524 regsvr32.exe 3524 regsvr32.exe 4756 regsvr32.exe 4756 regsvr32.exe 4504 regsvr32.exe 4504 regsvr32.exe 4504 regsvr32.exe 4504 regsvr32.exe 1652 regsvr32.exe 1652 regsvr32.exe 1540 regsvr32.exe 1540 regsvr32.exe 1540 regsvr32.exe 1540 regsvr32.exe 812 regsvr32.exe 812 regsvr32.exe 4448 regsvr32.exe 4448 regsvr32.exe 4448 regsvr32.exe 4448 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4792 EXCEL.EXE 4792 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE 4792 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4792 wrote to memory of 4056 4792 EXCEL.EXE 70 PID 4792 wrote to memory of 4056 4792 EXCEL.EXE 70 PID 4056 wrote to memory of 3524 4056 regsvr32.exe 72 PID 4056 wrote to memory of 3524 4056 regsvr32.exe 72 PID 4792 wrote to memory of 4756 4792 EXCEL.EXE 73 PID 4792 wrote to memory of 4756 4792 EXCEL.EXE 73 PID 4756 wrote to memory of 4504 4756 regsvr32.exe 75 PID 4756 wrote to memory of 4504 4756 regsvr32.exe 75 PID 4792 wrote to memory of 1652 4792 EXCEL.EXE 76 PID 4792 wrote to memory of 1652 4792 EXCEL.EXE 76 PID 1652 wrote to memory of 1540 1652 regsvr32.exe 77 PID 1652 wrote to memory of 1540 1652 regsvr32.exe 77 PID 4792 wrote to memory of 812 4792 EXCEL.EXE 78 PID 4792 wrote to memory of 812 4792 EXCEL.EXE 78 PID 812 wrote to memory of 4448 812 regsvr32.exe 79 PID 812 wrote to memory of 4448 812 regsvr32.exe 79
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\dd5a2731ea158f234836d90487f79adfae8b93f5b7f847dbb6cd4d766037e46d.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\GLfFrHSD\sPmncD.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3524
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\QIRzNBcJVOwR\NJTvG.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4504
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VgzFiYCqTKTCziyr\SwyJ.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1540
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:812 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\WnviUqesEMr\fkqw.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4448
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
818KB
MD506217dcfbd4120d1632d8aca2d2c7e9d
SHA14bd2057df32bc9bce22ab52b0fbc5d8d15d1160c
SHA25670f41715a0c623693af14c0adf02509b42a625d6a4dd8124850bd0a70ef91fe6
SHA5124423056690743afcee33267d55cbb9f3eecd65b4f7083e287ec50d377349efac7245576931d520e24597e4672088e665c4449d5be412cac5a2967f60af9f6c0b
-
Filesize
818KB
MD5397991a2f32b645fadfbe994eb125e88
SHA1d85e5bea10e32bb87bd94bbaafa41bf63a73b788
SHA256939bdb339dd2d45bf653dad08d0fbfd633e731ddb92fd49b51cd83df938635a2
SHA512cb5f73d8467a88a9fe1a75cccd20b09155f3a1d83fcb1aa4a9f9cce4f712ec8fa72c3bb1ee723d5d7e2e71e31ff89ec7bd92408902444242aaf664f8f55a4c50
-
Filesize
818KB
MD5d3e9de94c425629f42fca53c0a0a9c7e
SHA124612abadaee4bf8cb0e4c9fa0a0ac9efa7eb9e1
SHA2560fb6e3d808ec24e2189790637a5ed54a8c1674fe8f7054e46ddb278abd663dc7
SHA512af6097eaa12092e9e166a48fa77074bc23a35ca292c12f8f4bd8c94a392e89e1fc91fab2f0f950986af6b2715fdd39fe996223b77a7e8f594f641d088dd8a407
-
Filesize
818KB
MD57c6912240dcd299070a06f3f2e85e4ea
SHA1ee839f33810d911b9d7015e9797e52ba79a9d6d6
SHA256bfaf8f2ac928c80995da925c4d746475f37aeb60ff22c9d91b5d36c507b1f347
SHA512912bc264d1ea1d9cad64c830fafa4bce9d1f355725f03d9d372328aebfd2709ad357961971ebcb5c26ebb067b793320c7d964009ddddfe25175023a06489db7a
-
Filesize
818KB
MD506217dcfbd4120d1632d8aca2d2c7e9d
SHA14bd2057df32bc9bce22ab52b0fbc5d8d15d1160c
SHA25670f41715a0c623693af14c0adf02509b42a625d6a4dd8124850bd0a70ef91fe6
SHA5124423056690743afcee33267d55cbb9f3eecd65b4f7083e287ec50d377349efac7245576931d520e24597e4672088e665c4449d5be412cac5a2967f60af9f6c0b
-
Filesize
818KB
MD5397991a2f32b645fadfbe994eb125e88
SHA1d85e5bea10e32bb87bd94bbaafa41bf63a73b788
SHA256939bdb339dd2d45bf653dad08d0fbfd633e731ddb92fd49b51cd83df938635a2
SHA512cb5f73d8467a88a9fe1a75cccd20b09155f3a1d83fcb1aa4a9f9cce4f712ec8fa72c3bb1ee723d5d7e2e71e31ff89ec7bd92408902444242aaf664f8f55a4c50
-
Filesize
818KB
MD5d3e9de94c425629f42fca53c0a0a9c7e
SHA124612abadaee4bf8cb0e4c9fa0a0ac9efa7eb9e1
SHA2560fb6e3d808ec24e2189790637a5ed54a8c1674fe8f7054e46ddb278abd663dc7
SHA512af6097eaa12092e9e166a48fa77074bc23a35ca292c12f8f4bd8c94a392e89e1fc91fab2f0f950986af6b2715fdd39fe996223b77a7e8f594f641d088dd8a407
-
Filesize
818KB
MD57c6912240dcd299070a06f3f2e85e4ea
SHA1ee839f33810d911b9d7015e9797e52ba79a9d6d6
SHA256bfaf8f2ac928c80995da925c4d746475f37aeb60ff22c9d91b5d36c507b1f347
SHA512912bc264d1ea1d9cad64c830fafa4bce9d1f355725f03d9d372328aebfd2709ad357961971ebcb5c26ebb067b793320c7d964009ddddfe25175023a06489db7a