Analysis
-
max time kernel
137s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
21/03/2025, 18:29
Static task
static1
Behavioral task
behavioral1
Sample
attendees.xlsm
Resource
win7-20241010-en
General
-
Target
attendees.xlsm
-
Size
535KB
-
MD5
b556307e1e6462a9aea5dc1f76667d10
-
SHA1
e3525ffd85d51a0a502012492ed1ef54d22eec88
-
SHA256
804e3a6cde4114e76fa911b699891535c8ed8b637ee9eaad373619e3ce36ee19
-
SHA512
51666a80ae3ae2ba69954f47e36521ce08cece8dd258498a7cf88e6c2586fa9a66776c78d68538bca5568965ebca87e9d04ce79db2c2388716ab73182af7164b
-
SSDEEP
12288:E9ijex0VbLbGeH+59SjrPImbT4XXO8RGNQpRtL8PZY4krmStNpc:E9fKVbLte52rPImbCjGWpj8BYVmSt/c
Malware Config
Signatures
-
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4736 4156 tar.exe 86 Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3572 4156 rundll32.exe 86 -
Trickbot family
-
resource yara_rule behavioral2/memory/2996-57-0x0000000002280000-0x00000000022B9000-memory.dmp templ_dll behavioral2/memory/2996-60-0x00000000024C0000-0x00000000024F7000-memory.dmp templ_dll -
Loads dropped DLL 1 IoCs
pid Process 2996 rundll32.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 4156 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5532 wermgr.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE 4156 EXCEL.EXE -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 4156 wrote to memory of 4736 4156 EXCEL.EXE 90 PID 4156 wrote to memory of 4736 4156 EXCEL.EXE 90 PID 4156 wrote to memory of 3572 4156 EXCEL.EXE 97 PID 4156 wrote to memory of 3572 4156 EXCEL.EXE 97 PID 3572 wrote to memory of 2996 3572 rundll32.exe 98 PID 3572 wrote to memory of 2996 3572 rundll32.exe 98 PID 3572 wrote to memory of 2996 3572 rundll32.exe 98 PID 2996 wrote to memory of 5532 2996 rundll32.exe 100 PID 2996 wrote to memory of 5532 2996 rundll32.exe 100 PID 2996 wrote to memory of 5532 2996 rundll32.exe 100 PID 2996 wrote to memory of 5532 2996 rundll32.exe 100
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\attendees.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\SYSTEM32\tar.exetar -xf ..\Nioka.meposv -C ..\2⤵
- Process spawned unexpected child process
PID:4736
-
-
C:\Windows\SYSTEM32\rundll32.exerundll32 ..\xl\media\image2.bmp,StartW2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Windows\SysWOW64\rundll32.exerundll32 ..\xl\media\image2.bmp,StartW3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\system32\wermgr.exeC:\Windows\system32\wermgr.exe4⤵
- Suspicious use of AdjustPrivilegeToken
PID:5532
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\b8ab77100df80ab2.customDestinations-ms
Filesize3KB
MD533f52cc849dbcf8c00b6d8a85a3a3877
SHA17c9b26553172f144122f71b8e85828ccab5dba56
SHA256fef20e9c8f637d528a96e011477e258a4a2209f5f05da46df8eb57cf2cba8ab0
SHA512500b3390f4d4334689fa7e7641dfaa3d1f9d28a320f1369b71ece7611af0c80037a95e8736cb8c7d1c0cd7ec524ce2df6cf304586de68a11097e6d335f95ecea
-
Filesize
535KB
MD5e8e77bb34f44a71e79f711c321099bc1
SHA1f15ee793a7a0136215b571d827b8488d2795ae46
SHA256b1bb2db67f7899cce912342bf3e1dad24806ff0cc3d7c6a716852363d264d9ec
SHA5128a96523f216b040b03f784c041dddfd90cfdc790e610bf899988f813139487127937fa039de7b5d8e4820d41fe5378ade4f6405c9804c44bb03ae6e51ef32b0e
-
Filesize
496KB
MD5814071ec92b0429d274082e3993aa5af
SHA10f191570dcbecda0c18c48eac960c0def6779e2f
SHA256e283651e374533499d1552b94005f00360fda4f267f46d719bb6b02e8764243b
SHA512a6b4013630655a6754b59e0cdb76d85a3a165bc8506ce55fd4aef99bf1790e7abc9dfa071dcd7ce0fcf528a9a483ff91f14fa7f8d80048a4e41c4c9f2d38cf68