Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
12/01/2023, 21:32
Static task
static1
Behavioral task
behavioral1
Sample
منتجات مقر الاتحاد العام للصناعات.xll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
منتجات مقر الاتحاد العام للصناعات.xll
Resource
win10v2004-20221111-en
General
-
Target
منتجات مقر الاتحاد العام للصناعات.xll
-
Size
769KB
-
MD5
b95b32b432f7eaa17e5b30b6f82a9530
-
SHA1
0666350494defd43db6d268c132cdf61473635e2
-
SHA256
f6d3cbc45d715b753399a9675392530fbbd1329fc2ec02a507af03943d6d4881
-
SHA512
4f5b1619c3e75248e4b67e6ae60675e8dab9328a8e1dcdff4cfb9e4daad008ff55b0bf5657a4956af5c02d508ee94500aba2cd2d1c0c8ab68e794c2621e3f0e2
-
SSDEEP
12288:NG1N4HkcgMsiOd58bzbBSre4Q0uqZzD1reWabd/zyCmAJoJHpQRwDYhMp:NoOOMX1I+QHT+dbphGJHpSwDYhMp
Malware Config
Extracted
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4292 onlinedrive.exe -
Loads dropped DLL 2 IoCs
pid Process 4580 EXCEL.EXE 4580 EXCEL.EXE -
Program crash 1 IoCs
pid pid_target Process procid_target 2120 1424 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4580 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4580 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE 4580 EXCEL.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4580 wrote to memory of 4292 4580 EXCEL.EXE 87 PID 4580 wrote to memory of 4292 4580 EXCEL.EXE 87 PID 4292 wrote to memory of 4376 4292 onlinedrive.exe 88 PID 4292 wrote to memory of 4376 4292 onlinedrive.exe 88 PID 4292 wrote to memory of 1224 4292 onlinedrive.exe 95 PID 4292 wrote to memory of 1224 4292 onlinedrive.exe 95 PID 4292 wrote to memory of 1516 4292 onlinedrive.exe 97 PID 4292 wrote to memory of 1516 4292 onlinedrive.exe 97 PID 4292 wrote to memory of 3632 4292 onlinedrive.exe 99 PID 4292 wrote to memory of 3632 4292 onlinedrive.exe 99 PID 4292 wrote to memory of 2580 4292 onlinedrive.exe 101 PID 4292 wrote to memory of 2580 4292 onlinedrive.exe 101 PID 4292 wrote to memory of 4728 4292 onlinedrive.exe 103 PID 4292 wrote to memory of 4728 4292 onlinedrive.exe 103
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\منتجات مقر الاتحاد العام للصناعات.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\onlinedrive.exe"C:\Users\Admin\AppData\Local\Temp\onlinedrive.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SYSTEM32\cmd.execmd3⤵PID:4376
-
-
C:\Windows\SYSTEM32\cmd.execmd3⤵PID:1224
-
-
C:\Windows\SYSTEM32\cmd.execmd3⤵PID:1516
-
-
C:\Windows\SYSTEM32\cmd.execmd3⤵PID:3632
-
-
C:\Windows\SYSTEM32\cmd.execmd3⤵PID:2580
-
-
C:\Windows\SYSTEM32\cmd.execmd3⤵PID:4728
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 472 -p 1424 -ip 14241⤵PID:372
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1424 -s 14681⤵
- Program crash
PID:2120
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
377KB
MD5cf16b73c4bc8b0b3169def3145515c51
SHA1d96122f40c613ec7569b0afa431670827b2b20f2
SHA2568b9242cdae9f1f916e026e7e09620a4f1cfd702caad9312dcd8c60c7921ed30d
SHA512b09080e5afd57afcbd78dde9ef707f7afb74afd04515d800b5e2e0f7832755131a1c1b7a1f32383e569c9945ffd7b73f9b4c44d9c3894e78093a3cb751310c8f
-
Filesize
769KB
MD5b95b32b432f7eaa17e5b30b6f82a9530
SHA10666350494defd43db6d268c132cdf61473635e2
SHA256f6d3cbc45d715b753399a9675392530fbbd1329fc2ec02a507af03943d6d4881
SHA5124f5b1619c3e75248e4b67e6ae60675e8dab9328a8e1dcdff4cfb9e4daad008ff55b0bf5657a4956af5c02d508ee94500aba2cd2d1c0c8ab68e794c2621e3f0e2
-
Filesize
769KB
MD5b95b32b432f7eaa17e5b30b6f82a9530
SHA10666350494defd43db6d268c132cdf61473635e2
SHA256f6d3cbc45d715b753399a9675392530fbbd1329fc2ec02a507af03943d6d4881
SHA5124f5b1619c3e75248e4b67e6ae60675e8dab9328a8e1dcdff4cfb9e4daad008ff55b0bf5657a4956af5c02d508ee94500aba2cd2d1c0c8ab68e794c2621e3f0e2