Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2022 05:02
Behavioral task
behavioral1
Sample
1 Total New Invoices-Thursday January 21 2021_EvilClippy.xlsm
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1 Total New Invoices-Thursday January 21 2021_EvilClippy.xlsm
Resource
win10v2004-20221111-en
General
-
Target
1 Total New Invoices-Thursday January 21 2021_EvilClippy.xlsm
-
Size
27KB
-
MD5
ae139f2cc20b9b3f2d18bfcf7d9eb15c
-
SHA1
95a78defecdb76f75b2865c6314cb22d241b69cb
-
SHA256
b10d9193aa930763de20f5105a9f1ad86f4af4fff934d22421c2ff52e16d0a9a
-
SHA512
9086c3ff9880c449ceb20be5e2c7f0cb563452ff0db30c8b0581fd0a9ab64d950c26ebdda7faf17efe92ca0df3bef233ab37c7733149c0707b95121db729d16f
-
SSDEEP
384:Ty72lRJT9Q47QbzZW6iVOC/e3vPlqJzhscrgDCQjZCfZQAjgPeq71LyGVQ5Eieaz:y25HQbdsVle3vUJmcMDiQ0w7Jq5cawU
Malware Config
Extracted
https://trezors.io.mahlongwa.com/rexj53wq.zip
https://wiki.deveyesgroup.com/zbd2ng4j.zip
https://cpanel.takeorders.co.uk/kzwc4s.zip
https://nlmcvt.blissgene.com/grh5fw.rar
https://t4p.autors.pt/hk1sqc.rar
https://oasis.ivpr.org/kek4cz.zip
https://app-halifax-mobileverification-mobileappupdate-system-update.cgsconstructores.com/abwtwv3x.zip
https://peau2.ivpr.org/sgo2vq0.zip
https://challengebarbell.co.in/vy6evt.zip
https://ebay.vehicle.sales.aketbd.com/ssvklay.rar
https://urbantrapfest.cl/byd2p9.zip
https://4evakleen.com.au/mq722o00t.rar
https://junzhang.webme.us/wiwl81d.zip
https://web.guatemayavirtual.com/yqqu2ex.zip
https://40fortyfoods.com/dwujyxoyd.rar
https://qdtoolkit.thelaeffect.com/cm96j9axl.zip
https://mail.qcvmail.com/k5fhmlr.zip
https://miloscolic.bplaced.net/bsanc5ak.zip
https://dentart.elitemarketing.hu/upeb9y2m.rar
https://sellitzer.perkss.co.uk/spqo38ic.zip
https://franchising.phone-recovery.it/ya75s29h.zip
https://noblesteel.com.au/eev8fmc.rar
https://jaalifestyle.my.id/z90r05.rar
https://agritork.com.tr/er7itgi.rar
https://demo.opacokitchens.com/dq9b7u.zip
https://scrap.nepalesehost.com/bde07cx.zip
https://messagesecureapp.duckdns.org/qh528ype.zip
https://marlenesbrothel.com.au/jcp05s.zip
https://plajart.com/gj1qlwo.rar
https://0007.name/t7kw7bb.zip
https://thnconsult.com/dbmbyhh.rar
https://ofice.seriesnow.website/qbeda328.rar
https://shadowsecinjector.cf/pymp0wkh.zip
https://staging.lincmagazine.deveyesgroup.com/duruhbp6.zip
https://taoyonghao.webme.us/szuadd.rar
https://messagesecurepaypal.duckdns.org/jf8s8z.rar
https://queensradiationtherapy.com/dbaobi.zip
https://valeriaromero.com/gsb509kb.rar
https://controlcenter.mystand.pt/lzvngo469.rar
https://vanzare.cabanabrazi2.ro/od14p7v.rar
https://sanelcorp.com/zo8me9g.rar
https://bigcomics.cf/zklovc4vb.rar
https://misturafinapizzaria.com.br/ex4k9x.zip
https://str.shoppclick.com/hasb2l.zip
https://download.nepalesehost.com/wyvnrv0z.rar
https://picinfor.com/nbwqh6n0.zip
https://vienen.gblix.srv.br/fdwzkmx.rar
https://lanjar.seriesnow.website/x16t6gr7.zip
https://ozdomb.elitemarketing.hu/xax7k4mlp.zip
https://amirartstudio.com/oc87ak5.rar
https://areins.org/dkwjfvif.zip
https://liquidglovehandsanitizer.com/fjkfv3s.zip
https://tokajkonferencia.elitemarketing.hu/bmaxb7d.zip
https://tit.elitemarketing.hu/j0wq82a.zip
https://freightnet.drapac.com/lss2lh.zip
https://down.seriesnow.website/k92u9vb.rar
https://atamakultura.com/sdq3lsdzp.zip
https://teneth.co.za/lev5e9.rar
https://mertlog.com/o3ef15.rar
https://smsh.care/k1xjwsax.zip
https://imbueautoworx.co.za/jpfnnl2g.zip
https://royallogistic.info/sj5a1ajw.rar
https://itake1.com/ihrlkispj.zip
https://huevacations.com/ot0g7ot.zip
https://uisusa.uisusa.com/fmqmmw.zip
https://www.networkaruba.com/k9kl6e.rar
https://immigration.omsms.in/lin58hwsh.zip
https://supergrafperu.com/aeknas.rar
https://2015.grupokeithmar.com/bhn10bigh.rar
https://isiphephelocon.co.za/h33pky.rar
https://arm.backyardproject.net/bdu3uazp.zip
https://rajibpalit.ifunnelspro.com/megv9bls6.zip
https://f1sol.com/ibnt6ia.rar
https://gonzalezsirit.techsavvyway.com/t39cqvcu.rar
https://afautomotores.com.py/nzr55o.zip
https://torresquinterocorp.com/w50lew.zip
https://funamituristico.org/ivt9yh12.rar
https://app.mirrorlabelsindia.com/zlmfkl.rar
https://fakihlaw.atwebpages.com/rybt1i.rar
https://demo.omsms.in/iri3np7.rar
Extracted
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
regsvr32.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3244 4968 regsvr32.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4836 4968 regsvr32.exe EXCEL.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4968 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
EXCEL.EXEpid process 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE 4968 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEdescription pid process target process PID 4968 wrote to memory of 3244 4968 EXCEL.EXE regsvr32.exe PID 4968 wrote to memory of 3244 4968 EXCEL.EXE regsvr32.exe PID 4968 wrote to memory of 4836 4968 EXCEL.EXE regsvr32.exe PID 4968 wrote to memory of 4836 4968 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\1 Total New Invoices-Thursday January 21 2021_EvilClippy.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\jovnwrzj.dll2⤵
- Process spawned unexpected child process
PID:3244 -
C:\Windows\System32\regsvr32.exe"C:\Windows\System32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\jovnwrzj.dll2⤵
- Process spawned unexpected child process
PID:4836