Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2022, 14:14
Behavioral task
behavioral1
Sample
DETALLES-03112022.xls
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
DETALLES-03112022.xls
Resource
win10v2004-20220812-en
General
-
Target
DETALLES-03112022.xls
-
Size
217KB
-
MD5
cc394ef471408f7cef71bab18e5293c7
-
SHA1
4bca38b998e1d4ebe18117732149ef166c09b747
-
SHA256
7b3078d413b8b68bffad47dbdb94bfb5bbd1909f671f774db2f73953867f3db7
-
SHA512
9afc945b88940ed45a926b563ec4524872e9a9a03d161c6af7b38ddb40d7f5b2729e55a50dc6e1592c2c401283c2078df7459d5c73d7f3c891b1f4231689a85d
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQmd:nbGUMVWlbd
Malware Config
Extracted
http://kabaruntukrakyat.com/wp-content/B9oJ0jh/
http://coinkub.com/wp-content/WwrJvjumS/
https://aberractivity.hu/iqq/Dmtv/
https://anamafegarcia.es/css/HfFXMTXvc40t/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2976 5116 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3844 5116 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1820 5116 regsvr32.exe 81 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 828 5116 regsvr32.exe 81 -
Downloads MZ/PE file
-
Loads dropped DLL 8 IoCs
pid Process 2976 regsvr32.exe 2036 regsvr32.exe 3844 regsvr32.exe 3184 regsvr32.exe 1820 regsvr32.exe 1920 regsvr32.exe 828 regsvr32.exe 3384 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\DSJowq.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\AILyWwJdkkkiwalj\\DSJowq.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\JajOi.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\FoUnmoUTQYf\\JajOi.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\vwSFpAP.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\ERHymjGIWFYXcFQ\\vwSFpAP.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WQQDEP.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\XZMDwBpTLlx\\WQQDEP.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 5116 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2976 regsvr32.exe 2976 regsvr32.exe 2036 regsvr32.exe 2036 regsvr32.exe 2036 regsvr32.exe 2036 regsvr32.exe 3844 regsvr32.exe 3844 regsvr32.exe 3184 regsvr32.exe 3184 regsvr32.exe 3184 regsvr32.exe 3184 regsvr32.exe 1820 regsvr32.exe 1820 regsvr32.exe 1920 regsvr32.exe 1920 regsvr32.exe 1920 regsvr32.exe 1920 regsvr32.exe 828 regsvr32.exe 828 regsvr32.exe 3384 regsvr32.exe 3384 regsvr32.exe 3384 regsvr32.exe 3384 regsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE 5116 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 5116 wrote to memory of 2976 5116 EXCEL.EXE 84 PID 5116 wrote to memory of 2976 5116 EXCEL.EXE 84 PID 2976 wrote to memory of 2036 2976 regsvr32.exe 85 PID 2976 wrote to memory of 2036 2976 regsvr32.exe 85 PID 5116 wrote to memory of 3844 5116 EXCEL.EXE 86 PID 5116 wrote to memory of 3844 5116 EXCEL.EXE 86 PID 3844 wrote to memory of 3184 3844 regsvr32.exe 87 PID 3844 wrote to memory of 3184 3844 regsvr32.exe 87 PID 5116 wrote to memory of 1820 5116 EXCEL.EXE 93 PID 5116 wrote to memory of 1820 5116 EXCEL.EXE 93 PID 1820 wrote to memory of 1920 1820 regsvr32.exe 96 PID 1820 wrote to memory of 1920 1820 regsvr32.exe 96 PID 5116 wrote to memory of 828 5116 EXCEL.EXE 97 PID 5116 wrote to memory of 828 5116 EXCEL.EXE 97 PID 828 wrote to memory of 3384 828 regsvr32.exe 98 PID 828 wrote to memory of 3384 828 regsvr32.exe 98
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\DETALLES-03112022.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\ERHymjGIWFYXcFQ\vwSFpAP.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2036
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3844 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\XZMDwBpTLlx\WQQDEP.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3184
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\AILyWwJdkkkiwalj\DSJowq.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1920
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\FoUnmoUTQYf\JajOi.dll"3⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3384
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
818KB
MD5450444e585d6ecbe93c49299bead9908
SHA14fbb8532ddc3e8eeb5d4ddcd6ff6e5abebf278e0
SHA256c20cf808446ab5bf04ad08d585b739d10971d14e643f6871c71d03c9e1013ac7
SHA5120354c4aeb8341745bae6949005b06cd59a3b464e601bd1019d791a171b352b2ad0e203997b1e88c4726c5a8b0288c38d94f91c728828009692715b4d4a52376a
-
Filesize
818KB
MD5450444e585d6ecbe93c49299bead9908
SHA14fbb8532ddc3e8eeb5d4ddcd6ff6e5abebf278e0
SHA256c20cf808446ab5bf04ad08d585b739d10971d14e643f6871c71d03c9e1013ac7
SHA5120354c4aeb8341745bae6949005b06cd59a3b464e601bd1019d791a171b352b2ad0e203997b1e88c4726c5a8b0288c38d94f91c728828009692715b4d4a52376a
-
Filesize
818KB
MD5f9dc587e63d92cc6c76c2eaa82fc6deb
SHA1b6417cf0af988bed1f6bd3c56de58148ce16213d
SHA2564a6bee5bae96fad16a1fe992fa36dda1ab19e65c8a68f5ffd9f8c02976e3c73e
SHA512f03d751e959e2f09657d7df5f00846d19358cb16d44f1501e2c17bdab616606d4dcb25293650d06da8cacd8c87735fcac637b5d53b3b8d35c19946758287f335
-
Filesize
818KB
MD5f9dc587e63d92cc6c76c2eaa82fc6deb
SHA1b6417cf0af988bed1f6bd3c56de58148ce16213d
SHA2564a6bee5bae96fad16a1fe992fa36dda1ab19e65c8a68f5ffd9f8c02976e3c73e
SHA512f03d751e959e2f09657d7df5f00846d19358cb16d44f1501e2c17bdab616606d4dcb25293650d06da8cacd8c87735fcac637b5d53b3b8d35c19946758287f335
-
Filesize
818KB
MD5c1341753813cb9610a5543e6037f69d3
SHA1d5872f62b08d1768aca4f7f1bec14fad905882c2
SHA2566e87cf21745fded553864dc8e1f3466ffab20c99701597b60d7916701ebbfdc8
SHA512543e3a045a04f1034058dd4a9bdff62ad13c5e2af1925e337ed02825e290053ed9b65f03ce435597bf6ba6730225d8acd601d27f7f4e6945d33066ed9d71dec0
-
Filesize
818KB
MD5c1341753813cb9610a5543e6037f69d3
SHA1d5872f62b08d1768aca4f7f1bec14fad905882c2
SHA2566e87cf21745fded553864dc8e1f3466ffab20c99701597b60d7916701ebbfdc8
SHA512543e3a045a04f1034058dd4a9bdff62ad13c5e2af1925e337ed02825e290053ed9b65f03ce435597bf6ba6730225d8acd601d27f7f4e6945d33066ed9d71dec0
-
Filesize
818KB
MD545f21cdaeb6d423b940ccef9e728bba4
SHA1b020bd4697a13b3661808a951c255207c810bc8a
SHA25610c9bec9889d07c47d78172f5393b21c097feac6fd3911acb6587456a6df5d18
SHA512973b2d46cc911827bd59e6102862b22281377bdc0c308f0b8348b490724a590e340d70c6c5781ac0f84531d10304b904f197e8f969f53ed7f3be58850753f6d3
-
Filesize
818KB
MD545f21cdaeb6d423b940ccef9e728bba4
SHA1b020bd4697a13b3661808a951c255207c810bc8a
SHA25610c9bec9889d07c47d78172f5393b21c097feac6fd3911acb6587456a6df5d18
SHA512973b2d46cc911827bd59e6102862b22281377bdc0c308f0b8348b490724a590e340d70c6c5781ac0f84531d10304b904f197e8f969f53ed7f3be58850753f6d3
-
Filesize
818KB
MD5c1341753813cb9610a5543e6037f69d3
SHA1d5872f62b08d1768aca4f7f1bec14fad905882c2
SHA2566e87cf21745fded553864dc8e1f3466ffab20c99701597b60d7916701ebbfdc8
SHA512543e3a045a04f1034058dd4a9bdff62ad13c5e2af1925e337ed02825e290053ed9b65f03ce435597bf6ba6730225d8acd601d27f7f4e6945d33066ed9d71dec0
-
Filesize
818KB
MD5450444e585d6ecbe93c49299bead9908
SHA14fbb8532ddc3e8eeb5d4ddcd6ff6e5abebf278e0
SHA256c20cf808446ab5bf04ad08d585b739d10971d14e643f6871c71d03c9e1013ac7
SHA5120354c4aeb8341745bae6949005b06cd59a3b464e601bd1019d791a171b352b2ad0e203997b1e88c4726c5a8b0288c38d94f91c728828009692715b4d4a52376a
-
Filesize
818KB
MD545f21cdaeb6d423b940ccef9e728bba4
SHA1b020bd4697a13b3661808a951c255207c810bc8a
SHA25610c9bec9889d07c47d78172f5393b21c097feac6fd3911acb6587456a6df5d18
SHA512973b2d46cc911827bd59e6102862b22281377bdc0c308f0b8348b490724a590e340d70c6c5781ac0f84531d10304b904f197e8f969f53ed7f3be58850753f6d3
-
Filesize
818KB
MD5f9dc587e63d92cc6c76c2eaa82fc6deb
SHA1b6417cf0af988bed1f6bd3c56de58148ce16213d
SHA2564a6bee5bae96fad16a1fe992fa36dda1ab19e65c8a68f5ffd9f8c02976e3c73e
SHA512f03d751e959e2f09657d7df5f00846d19358cb16d44f1501e2c17bdab616606d4dcb25293650d06da8cacd8c87735fcac637b5d53b3b8d35c19946758287f335