Analysis
-
max time kernel
100s -
max time network
136s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
03/11/2022, 18:11
Behavioral task
behavioral1
Sample
c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc.xls
Resource
win10-20220812-en
Behavioral task
behavioral2
Sample
c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc.xls
Resource
win10-20220812-en
General
-
Target
c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc.xls
-
Size
217KB
-
MD5
0e418b517559f1c8a8fae6f55de2be46
-
SHA1
e72e81d6dcf50e628e7603ce304ebe26cecb0aa2
-
SHA256
c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc
-
SHA512
56181569c1107f06302f28f3271945f4a653b3aee0bfa457888213303adb21d3f494485c596d73327dfbc64204d79bf24a4bbb7fdc8b2fa0804a32143bcddfa3
-
SSDEEP
6144:OKpb8rGYrMPe3q7Q0XV5xtuEsi8/dg8yY+TAQXTHGUMEyP5p6f5jQmx:nbGUMVWlbx
Malware Config
Extracted
http://kabaruntukrakyat.com/wp-content/B9oJ0jh/
http://coinkub.com/wp-content/WwrJvjumS/
https://aberractivity.hu/iqq/Dmtv/
https://anamafegarcia.es/css/HfFXMTXvc40t/
Signatures
-
Process spawned unexpected child process 4 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3372 4200 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4476 4200 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4972 4200 regsvr32.exe 65 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1796 4200 regsvr32.exe 65 -
Downloads MZ/PE file
-
Loads dropped DLL 4 IoCs
pid Process 3372 regsvr32.exe 4476 regsvr32.exe 4972 regsvr32.exe 1796 regsvr32.exe -
Adds Run key to start application 2 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ViWnUya.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\NqCFfStZ\\ViWnUya.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RrkVhhODAbBKO.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\VhEspTGH\\RrkVhhODAbBKO.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\tLIRZwpvkkFiu.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\OhKvDyYtIYC\\tLIRZwpvkkFiu.dll\"" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QgJlO.dll = "C:\\Windows\\system32\\regsvr32.exe \"C:\\Windows\\system32\\RBnXP\\QgJlO.dll\"" regsvr32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4200 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3372 regsvr32.exe 3372 regsvr32.exe 4676 regsvr32.exe 4676 regsvr32.exe 4676 regsvr32.exe 4676 regsvr32.exe 4476 regsvr32.exe 4476 regsvr32.exe 4980 regsvr32.exe 4980 regsvr32.exe 4980 regsvr32.exe 4980 regsvr32.exe 4972 regsvr32.exe 4972 regsvr32.exe 860 regsvr32.exe 860 regsvr32.exe 860 regsvr32.exe 860 regsvr32.exe 1796 regsvr32.exe 1796 regsvr32.exe 1488 regsvr32.exe 1488 regsvr32.exe 1488 regsvr32.exe 1488 regsvr32.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 4200 EXCEL.EXE 4200 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE 4200 EXCEL.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 4200 wrote to memory of 3372 4200 EXCEL.EXE 70 PID 4200 wrote to memory of 3372 4200 EXCEL.EXE 70 PID 3372 wrote to memory of 4676 3372 regsvr32.exe 71 PID 3372 wrote to memory of 4676 3372 regsvr32.exe 71 PID 4200 wrote to memory of 4476 4200 EXCEL.EXE 72 PID 4200 wrote to memory of 4476 4200 EXCEL.EXE 72 PID 4476 wrote to memory of 4980 4476 regsvr32.exe 74 PID 4476 wrote to memory of 4980 4476 regsvr32.exe 74 PID 4200 wrote to memory of 4972 4200 EXCEL.EXE 75 PID 4200 wrote to memory of 4972 4200 EXCEL.EXE 75 PID 4972 wrote to memory of 860 4972 regsvr32.exe 76 PID 4972 wrote to memory of 860 4972 regsvr32.exe 76 PID 4200 wrote to memory of 1796 4200 EXCEL.EXE 77 PID 4200 wrote to memory of 1796 4200 EXCEL.EXE 77 PID 1796 wrote to memory of 1488 1796 regsvr32.exe 78 PID 1796 wrote to memory of 1488 1796 regsvr32.exe 78
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\c7a9355b272440826e9c534f5b65bccb5a222a6298200674092b5cfe5c31cbfc.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv1.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3372 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\RBnXP\QgJlO.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4676
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv2.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\NqCFfStZ\ViWnUya.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4980
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv3.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\VhEspTGH\RrkVhhODAbBKO.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:860
-
-
-
C:\Windows\System32\regsvr32.exeC:\Windows\System32\regsvr32.exe /S ..\oxnv4.ooccxx2⤵
- Process spawned unexpected child process
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\system32\regsvr32.exeC:\Windows\system32\regsvr32.exe "C:\Windows\system32\OhKvDyYtIYC\tLIRZwpvkkFiu.dll"3⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1488
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD52205da2892c2c5e3168ff7fa12e86082
SHA1d55591eb35f583fbe748471e4048b65ee599aee2
SHA2561c923310118e38beb76d52250ef6cb7abcd9d17981c23104e05cf8bc2e1c83e0
SHA512cf552074bc3db38ffccaff26eebbf36a4da894c51289c3ac0e0d6ad5179753b44f4b09a6c818d4029ad2dff01f4cbc8ad7228c9eda44cc47406a234d08c1ffa4
-
Filesize
712KB
MD57cec1f22555ed67e526b6628d6618c02
SHA1ce6cecdfa14c7f2106d05e422c990fd837590bc5
SHA256a74c4512cafa2df37db1f82e28ab9e36989476ec36ba6b54307ca2f3557fbee8
SHA512e5e143903365e001494b7e5e6b8f5822f2250524e8d6380c881c2cd5b08f0c33a2caa7153538bc583e46a6f9e148d8498801f1d36e9461b6da2bedb9d3750528
-
Filesize
712KB
MD5cf481ebd7b5f13aa38d4fc40ee085625
SHA10271e23c6b938babf49598749811a18ffc796b8b
SHA256d52772b41dc880c90bbe089fdf7389292e740e69bf39b88c2c36efbb92e558e0
SHA512eafad947765c6059298d80339f40a2b99f531afe083e7418bf5fe58bd64261b6d4194d58f5d8e07f3a3e6b55f7fa6809f17a2382a4f6d766530c0843b7d88faf
-
Filesize
712KB
MD522db57d2f2e066fa29fa2d3132e82e85
SHA17db0c61da18f31f5fd8c23a2180a0acbab99768d
SHA256c788e560b0686db38b85c9ae972f988ec310907dcd04229900d052c93250e135
SHA512bee6585b1cab8b0a6b8f21eb90cfa1433a1e0a18abbe90885162fd651e8a506270756a35de5bb18bf26f772fbdaedf1652c5becab85db11f43ea6d15d859a17e
-
Filesize
712KB
MD52205da2892c2c5e3168ff7fa12e86082
SHA1d55591eb35f583fbe748471e4048b65ee599aee2
SHA2561c923310118e38beb76d52250ef6cb7abcd9d17981c23104e05cf8bc2e1c83e0
SHA512cf552074bc3db38ffccaff26eebbf36a4da894c51289c3ac0e0d6ad5179753b44f4b09a6c818d4029ad2dff01f4cbc8ad7228c9eda44cc47406a234d08c1ffa4
-
Filesize
712KB
MD57cec1f22555ed67e526b6628d6618c02
SHA1ce6cecdfa14c7f2106d05e422c990fd837590bc5
SHA256a74c4512cafa2df37db1f82e28ab9e36989476ec36ba6b54307ca2f3557fbee8
SHA512e5e143903365e001494b7e5e6b8f5822f2250524e8d6380c881c2cd5b08f0c33a2caa7153538bc583e46a6f9e148d8498801f1d36e9461b6da2bedb9d3750528
-
Filesize
712KB
MD5cf481ebd7b5f13aa38d4fc40ee085625
SHA10271e23c6b938babf49598749811a18ffc796b8b
SHA256d52772b41dc880c90bbe089fdf7389292e740e69bf39b88c2c36efbb92e558e0
SHA512eafad947765c6059298d80339f40a2b99f531afe083e7418bf5fe58bd64261b6d4194d58f5d8e07f3a3e6b55f7fa6809f17a2382a4f6d766530c0843b7d88faf
-
Filesize
712KB
MD522db57d2f2e066fa29fa2d3132e82e85
SHA17db0c61da18f31f5fd8c23a2180a0acbab99768d
SHA256c788e560b0686db38b85c9ae972f988ec310907dcd04229900d052c93250e135
SHA512bee6585b1cab8b0a6b8f21eb90cfa1433a1e0a18abbe90885162fd651e8a506270756a35de5bb18bf26f772fbdaedf1652c5becab85db11f43ea6d15d859a17e