Analysis
-
max time kernel
68s -
max time network
156s -
platform
windows7_x64 -
resource
win7 -
submitted
10-07-2020 17:06
Static task
static1
Behavioral task
behavioral1
Sample
Bill of Lading.xlsm
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Bill of Lading.xlsm
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Bill of Lading.xlsm
-
Size
52KB
-
MD5
0cac1b783270081d56ad48554de3d0e8
-
SHA1
2afa117869dfb3cbf34979e2d01dd64de663e9a9
-
SHA256
0eeac411948772d2f29c4ed276d4f4419e17ab82762afb7d33ebd28ca00f6fa6
-
SHA512
10e9cf38b7ec171e1b442571c538288b09994e2226f58dda8e66d6e990fefae9f01499890f72445a54e3b8fdc4a1a2e31c83d6e1d01d2f74d32eb88c35d48983
Score
10/10
Malware Config
Signatures
-
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1131729243-447456001-3632642222-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Advf = "C:\\Users\\Admin\\AppData\\Local\\Advf\\Advf.hta" aSNbkyKnzhtPT.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1544 EXCEL.EXE 1544 EXCEL.EXE 1544 EXCEL.EXE 1044 ieinstal.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1540 set thread context of 1044 1540 aSNbkyKnzhtPT.exe 37 -
Launches Equation Editor 1 TTPs 1 IoCs
Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.
pid Process 752 EQNEDT32.EXE -
NTFS ADS 1 IoCs
description ioc Process File created C:\programdata\asc.txt:script1.vbs EXCEL.EXE -
Executes dropped EXE 1 IoCs
pid Process 1540 aSNbkyKnzhtPT.exe -
Script User-Agent 2 IoCs
description flow ioc HTTP User-Agent header 1 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 2 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1544 EXCEL.EXE -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 752 wrote to memory of 1052 752 EQNEDT32.EXE 25 PID 752 wrote to memory of 1052 752 EQNEDT32.EXE 25 PID 752 wrote to memory of 1052 752 EQNEDT32.EXE 25 PID 752 wrote to memory of 1052 752 EQNEDT32.EXE 25 PID 1052 wrote to memory of 1496 1052 cmd.exe 27 PID 1052 wrote to memory of 1496 1052 cmd.exe 27 PID 1052 wrote to memory of 1496 1052 cmd.exe 27 PID 1052 wrote to memory of 1496 1052 cmd.exe 27 PID 1544 wrote to memory of 1836 1544 EXCEL.EXE 28 PID 1544 wrote to memory of 1836 1544 EXCEL.EXE 28 PID 1544 wrote to memory of 1836 1544 EXCEL.EXE 28 PID 1496 wrote to memory of 1828 1496 cscript.exe 31 PID 1496 wrote to memory of 1828 1496 cscript.exe 31 PID 1496 wrote to memory of 1828 1496 cscript.exe 31 PID 1496 wrote to memory of 1828 1496 cscript.exe 31 PID 1828 wrote to memory of 1740 1828 cmd.exe 33 PID 1828 wrote to memory of 1740 1828 cmd.exe 33 PID 1828 wrote to memory of 1740 1828 cmd.exe 33 PID 1828 wrote to memory of 1740 1828 cmd.exe 33 PID 1836 wrote to memory of 1540 1836 cscript.exe 34 PID 1836 wrote to memory of 1540 1836 cscript.exe 34 PID 1836 wrote to memory of 1540 1836 cscript.exe 34 PID 1836 wrote to memory of 1540 1836 cscript.exe 34 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 PID 1540 wrote to memory of 1044 1540 aSNbkyKnzhtPT.exe 37 -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1836 1544 cscript.exe 23 -
Blacklisted process makes network request 2 IoCs
flow pid Process 1 1836 cscript.exe 2 1740 cscript.exe
Processes
-
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Bill of Lading.xlsm"1⤵
- Suspicious use of SetWindowsHookEx
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\programdata\asc.txt:script1.vbs2⤵
- Suspicious use of WriteProcessMemory
- Process spawned unexpected child process
- Blacklisted process makes network request
PID:1836 -
C:\programdata\aSNbkyKnzhtPT.exeC:\programdata\aSNbkyKnzhtPT.exe3⤵
- Adds Run entry to start application
- Suspicious use of SetThreadContext
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:1044
-
-
-
-
C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding1⤵
- Launches Equation Editor
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\cmd.execmd /c ren %tmp%\mm v&cScriPT %tmp%\v?..wsf C2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\cscript.execScriPT C:\Users\Admin\AppData\Local\Temp\v?..wsf C3⤵
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cscript C:\Users\Admin\AppData\Local\Temp\xx.vbs4⤵
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\cscript.execscript C:\Users\Admin\AppData\Local\Temp\xx.vbs5⤵
- Blacklisted process makes network request
PID:1740
-
-
-
-