Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2022 01:53
Behavioral task
behavioral1
Sample
Bazar.xlsb
Resource
win7-20220812-en
General
-
Target
Bazar.xlsb
-
Size
289KB
-
MD5
3b409c892001c72d4b1be7786cedf010
-
SHA1
8c3c7e4f570ab74b02003f0befe691a34c29e0d2
-
SHA256
32b9ed5ed7f0adfc8f39a6300e4fe0831a60c2b4e4631a4d6f7e96ee2b9ff40f
-
SHA512
8c229ee0831feb17e600fe5aa849d1887682746c9e61d4bd5fd8cce5623b1798d4691c112653da50ec292ac2d7d4452ed1ae961d13971aafae1c69addbfad2c9
-
SSDEEP
6144:J9GIZGd38S3knv1D8LtYOKlJbAuxcM4SPtDr3Dvyh:J9GmGd38XvAtjuy+P3Dv4
Malware Config
Extracted
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4048 3284 cmd.exe EXCEL.EXE -
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Users\Public\105011.gof acprotect C:\Users\Public\105011.gof acprotect -
Nloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4652-147-0x0000000001390000-0x0000000001395000-memory.dmp nloader -
Blocklisted process makes network request 1 IoCs
Processes:
rundll32.exeflow pid process 33 4652 rundll32.exe -
Processes:
resource yara_rule C:\Users\Public\105011.gof upx C:\Users\Public\105011.gof upx behavioral2/memory/4652-146-0x0000000075660000-0x0000000075693000-memory.dmp upx behavioral2/memory/4652-152-0x0000000075660000-0x0000000075693000-memory.dmp upx -
Loads dropped DLL 1 IoCs
Processes:
rundll32.exepid process 4652 rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 3284 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE 3284 EXCEL.EXE -
Suspicious use of WriteProcessMemory 9 IoCs
Processes:
EXCEL.EXEcmd.exerundll32.exedescription pid process target process PID 3284 wrote to memory of 4048 3284 EXCEL.EXE cmd.exe PID 3284 wrote to memory of 4048 3284 EXCEL.EXE cmd.exe PID 4048 wrote to memory of 3988 4048 cmd.exe certutil.exe PID 4048 wrote to memory of 3988 4048 cmd.exe certutil.exe PID 4048 wrote to memory of 828 4048 cmd.exe rundll32.exe PID 4048 wrote to memory of 828 4048 cmd.exe rundll32.exe PID 828 wrote to memory of 4652 828 rundll32.exe rundll32.exe PID 828 wrote to memory of 4652 828 rundll32.exe rundll32.exe PID 828 wrote to memory of 4652 828 rundll32.exe rundll32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Bazar.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SYSTEM32\cmd.execmd.exe /c certutil -decode %PUBLIC%\105011.oop %PUBLIC%\105011.gof && rundll32 %PUBLIC%\105011.gof,DF12⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Windows\system32\certutil.execertutil -decode C:\Users\Public\105011.oop C:\Users\Public\105011.gof3⤵PID:3988
-
C:\Windows\system32\rundll32.exerundll32 C:\Users\Public\105011.gof,DF13⤵
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\rundll32.exerundll32 C:\Users\Public\105011.gof,DF14⤵
- Blocklisted process makes network request
- Loads dropped DLL
PID:4652
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD52ecee3dd510442f9b28d62a339a6b7a0
SHA1f1bc56458af0bcc4265f58b812f860da45e90f8e
SHA25647b1f63e7db1c24ad6f692cf1eb0e92dd6de27a16051f390f5b441afc5049fea
SHA512f94a9220629181cd14f8cfec442c7b0c10f315617f64f8ef551be3c0fe6424a69f36269867328aaf95cbcd4627a32b47de4d438ed1233ae37c5a6ecf7fbb0c23
-
Filesize
102KB
MD52ecee3dd510442f9b28d62a339a6b7a0
SHA1f1bc56458af0bcc4265f58b812f860da45e90f8e
SHA25647b1f63e7db1c24ad6f692cf1eb0e92dd6de27a16051f390f5b441afc5049fea
SHA512f94a9220629181cd14f8cfec442c7b0c10f315617f64f8ef551be3c0fe6424a69f36269867328aaf95cbcd4627a32b47de4d438ed1233ae37c5a6ecf7fbb0c23
-
Filesize
137KB
MD53c79791ee7bbb25eb4139886bb27038d
SHA139163f362e64a03e920f63e9d5c4c1c5098fd7a9
SHA25648bc2ff4d55dfc60659213fbbc1543d7f4eed7feda54c5013be9f88668f87737
SHA51234adaa6907e0ce644f4519f10debd9a13cdc1f5a304108ec38a9b3707f0f3abaf10ca51920cfa3f20831d0d39ea3fdf871649323a094f241ebea417f21d32fea