Analysis
-
max time kernel
101s -
max time network
128s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03-11-2022 14:38
Behavioral task
behavioral1
Sample
2eb7daa6f3e753774558b2e4eb6582b7f439f19f552a97e909bb3975fc5a94e8.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
2eb7daa6f3e753774558b2e4eb6582b7f439f19f552a97e909bb3975fc5a94e8.xls
Resource
win10-20220812-en
General
-
Target
2eb7daa6f3e753774558b2e4eb6582b7f439f19f552a97e909bb3975fc5a94e8.xls
-
Size
217KB
-
MD5
32e7f0bb00b184d8ad91589b45e51030
-
SHA1
4807666cae2e0b01654c5ee30beedf45abe294ff
-
SHA256
2eb7daa6f3e753774558b2e4eb6582b7f439f19f552a97e909bb3975fc5a94e8
-
SHA512
b75106d4f73cb47ef9d9b79193d02970c6de7f324a0e0d4d738a94771fd19884c26051fe1e5b5962923627b83ed555703087e001b1568af9a34d18cb076940e9
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dgIyY+TAQXTHGUMEyP5p6f5jQmL:bbGUMVWlbL
Malware Config
Extracted
https://aprendeconmireia.com/images/wBu/
http://updailymail.com/cgi-bin/gBYmfqRi2utIS2n/
https://akuntansi.itny.ac.id/asset/9aVFvYeaSKOhGBSLx/
http://swiftwebbox.com/cgi-bin/vNqoMtQilpysJYRwtGu/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4616 3528 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4600 3528 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1192 3528 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1944 3528 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 4616 regsvr32.exe 4600 regsvr32.exe 1192 regsvr32.exe 1944 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\fHNcJPRC.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\RYELDDdlTIur\\fHNcJPRC.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YbhyCAfLnLeZSmvr.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\CgRpWrLSsjk\\YbhyCAfLnLeZSmvr.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\gImfxWPCoFBqtT.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\EzrOkDpqurMRkMtX\\gImfxWPCoFBqtT.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\KsDcvzvLpSbER.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\UcJCcwQgLqTjYzyoI\\KsDcvzvLpSbER.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3528 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 4616 regsvr32.exe 4616 regsvr32.exe 4360 regsvr32.exe 4360 regsvr32.exe 4360 regsvr32.exe 4360 regsvr32.exe 4600 regsvr32.exe 4600 regsvr32.exe 3168 regsvr32.exe 3168 regsvr32.exe 3168 regsvr32.exe 3168 regsvr32.exe 1192 regsvr32.exe 1192 regsvr32.exe 372 regsvr32.exe 372 regsvr32.exe 372 regsvr32.exe 372 regsvr32.exe 1944 regsvr32.exe 1944 regsvr32.exe 288 regsvr32.exe 288 regsvr32.exe 288 regsvr32.exe 288 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 3528 EXCEL.EXE 3528 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE 3528 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 3528 wrote to memory of 4616 3528 EXCEL.EXE 70 PID 3528 wrote to memory of 4616 3528 EXCEL.EXE 70 PID 4616 wrote to memory of 4360 4616 regsvr32.exe 72 PID 4616 wrote to memory of 4360 4616 regsvr32.exe 72 PID 3528 wrote to memory of 4600 3528 EXCEL.EXE 73 PID 3528 wrote to memory of 4600 3528 EXCEL.EXE 73 PID 4600 wrote to memory of 3168 4600 regsvr32.exe 75 PID 4600 wrote to memory of 3168 4600 regsvr32.exe 75 PID 3528 wrote to memory of 1192 3528 EXCEL.EXE 76 PID 3528 wrote to memory of 1192 3528 EXCEL.EXE 76 PID 1192 wrote to memory of 372 1192 regsvr32.exe 77 PID 1192 wrote to memory of 372 1192 regsvr32.exe 77 PID 3528 wrote to memory of 1944 3528 EXCEL.EXE 78 PID 3528 wrote to memory of 1944 3528 EXCEL.EXE 78 PID 1944 wrote to memory of 288 1944 regsvr32.exe 79 PID 1944 wrote to memory of 288 1944 regsvr32.exe 79
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2eb7daa6f3e753774558b2e4eb6582b7f439f19f552a97e909bb3975fc5a94e8.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\RYELDDdlTIur\fHNcJPRC.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4360
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\CgRpWrLSsjk\YbhyCAfLnLeZSmvr.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3168
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\EzrOkDpqurMRkMtX\gImfxWPCoFBqtT.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:372
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\UcJCcwQgLqTjYzyoI\KsDcvzvLpSbER.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:288
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
818KB
MD50c4c6773e87831ea6a07e8cc9954214d
SHA1962e9b651fb53a2797caea1a3d3ad1b6960c5c4f
SHA2560e00ab78dd4e1922b3ac756bc14e3b8d3c96c8564e907ebc30b7c0067eda8daf
SHA5120df7ca2bb1f5832c3a067da69775d022e4d0a416985c659cbc26fa51c5ef12bddcb715528f2b58ac3b11c43c23fea24c473a547cb506f385d780a28dc26ed41c
-
Filesize
818KB
MD58064bafc7eb625ff50a2439914c92256
SHA1a9372f0c6a5af367b40c5d83a651e86c6baf8edb
SHA256c9f195091530a894e34d12495772b7af8506179124c88748f34b521fc823e185
SHA5123eac35f45a62f706f613f6e21289592748c00359436fc459a84bdcd92b7d3af40c25a78370ce0c4a1b9b1e9443ab550ea2c21cdd9cf5eb151cce0fbcf99b9556
-
Filesize
818KB
MD533e227c694cbedb1746c4ac6219d4b04
SHA12b6886e78e57a018a046a37216307c01b4593509
SHA256aeb33bef031e44cbb61bef61a1bed28d3567d616c59707d2dcbb01ce7afa361e
SHA512e00b4d6c5f32ba664c0248f4f390cc597a922ca455b0b0770c9e4cd1d65d2ef1c325b69ed27035b5dc77af6b46cd9a5eac9813f9dfd9ff877b56dd711c2727f0
-
Filesize
818KB
MD5ac7198b49cd9b111fca8b4619cffd7f5
SHA1a94296dbbdf6cc0b560675da82a3d6cf151ed933
SHA2569cef9c95990363289cc118b76ccb0aa7335c26dde64a562d9387756869bdfa50
SHA512fd8456f4cf174abd10ad51dddfc3fed41b62f8f4eaf44833b9e0145d8991761f21d8baa6a6ba6842b9fc59c26b49306643c5b6cd7366029bf0e42edfff630118
-
Filesize
818KB
MD50c4c6773e87831ea6a07e8cc9954214d
SHA1962e9b651fb53a2797caea1a3d3ad1b6960c5c4f
SHA2560e00ab78dd4e1922b3ac756bc14e3b8d3c96c8564e907ebc30b7c0067eda8daf
SHA5120df7ca2bb1f5832c3a067da69775d022e4d0a416985c659cbc26fa51c5ef12bddcb715528f2b58ac3b11c43c23fea24c473a547cb506f385d780a28dc26ed41c
-
Filesize
818KB
MD58064bafc7eb625ff50a2439914c92256
SHA1a9372f0c6a5af367b40c5d83a651e86c6baf8edb
SHA256c9f195091530a894e34d12495772b7af8506179124c88748f34b521fc823e185
SHA5123eac35f45a62f706f613f6e21289592748c00359436fc459a84bdcd92b7d3af40c25a78370ce0c4a1b9b1e9443ab550ea2c21cdd9cf5eb151cce0fbcf99b9556
-
Filesize
818KB
MD533e227c694cbedb1746c4ac6219d4b04
SHA12b6886e78e57a018a046a37216307c01b4593509
SHA256aeb33bef031e44cbb61bef61a1bed28d3567d616c59707d2dcbb01ce7afa361e
SHA512e00b4d6c5f32ba664c0248f4f390cc597a922ca455b0b0770c9e4cd1d65d2ef1c325b69ed27035b5dc77af6b46cd9a5eac9813f9dfd9ff877b56dd711c2727f0
-
Filesize
818KB
MD5ac7198b49cd9b111fca8b4619cffd7f5
SHA1a94296dbbdf6cc0b560675da82a3d6cf151ed933
SHA2569cef9c95990363289cc118b76ccb0aa7335c26dde64a562d9387756869bdfa50
SHA512fd8456f4cf174abd10ad51dddfc3fed41b62f8f4eaf44833b9e0145d8991761f21d8baa6a6ba6842b9fc59c26b49306643c5b6cd7366029bf0e42edfff630118