Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
10-07-2020 17:06
Static task
static1
Behavioral task
behavioral1
Sample
Bill of Lading.xlsm
Resource
win7
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
Bill of Lading.xlsm
Resource
win10v200430
0 signatures
0 seconds
General
-
Target
Bill of Lading.xlsm
-
Size
52KB
-
MD5
0cac1b783270081d56ad48554de3d0e8
-
SHA1
2afa117869dfb3cbf34979e2d01dd64de663e9a9
-
SHA256
0eeac411948772d2f29c4ed276d4f4419e17ab82762afb7d33ebd28ca00f6fa6
-
SHA512
10e9cf38b7ec171e1b442571c538288b09994e2226f58dda8e66d6e990fefae9f01499890f72445a54e3b8fdc4a1a2e31c83d6e1d01d2f74d32eb88c35d48983
Score
10/10
Malware Config
Signatures
-
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1516 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2996 1516 cscript.exe 65 -
Script User-Agent 1 IoCs
description flow ioc HTTP User-Agent header 17 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Executes dropped EXE 1 IoCs
pid Process 3408 aSNbkyKnzhtPT.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3408 set thread context of 3776 3408 aSNbkyKnzhtPT.exe 78 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
NTFS ADS 3 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\mm:Zone.Identifier EXCEL.EXE File opened for modification C:\Users\Admin\AppData\Local\Temp\xx:Zone.Identifier EXCEL.EXE File created C:\programdata\asc.txt:script1.vbs EXCEL.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 1516 EXCEL.EXE 3776 ieinstal.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2996 1516 EXCEL.EXE 72 PID 1516 wrote to memory of 2996 1516 EXCEL.EXE 72 PID 2996 wrote to memory of 3408 2996 cscript.exe 76 PID 2996 wrote to memory of 3408 2996 cscript.exe 76 PID 2996 wrote to memory of 3408 2996 cscript.exe 76 PID 3408 wrote to memory of 3776 3408 aSNbkyKnzhtPT.exe 78 PID 3408 wrote to memory of 3776 3408 aSNbkyKnzhtPT.exe 78 PID 3408 wrote to memory of 3776 3408 aSNbkyKnzhtPT.exe 78 PID 3408 wrote to memory of 3776 3408 aSNbkyKnzhtPT.exe 78 PID 3408 wrote to memory of 3776 3408 aSNbkyKnzhtPT.exe 78 -
Blacklisted process makes network request 1 IoCs
flow pid Process 17 2996 cscript.exe -
Adds Run entry to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1231583446-2617009595-2137880041-1000\Software\Microsoft\Windows\CurrentVersion\Run\Advf = "C:\\Users\\Admin\\AppData\\Local\\Advf\\Advf.hta" aSNbkyKnzhtPT.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Bill of Lading.xlsm"1⤵
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Enumerates system info in registry
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\cscript.exe"C:\Windows\System32\cscript.exe" C:\programdata\asc.txt:script1.vbs2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
PID:2996 -
C:\programdata\aSNbkyKnzhtPT.exeC:\programdata\aSNbkyKnzhtPT.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- Adds Run entry to start application
PID:3408 -
C:\Program Files (x86)\internet explorer\ieinstal.exe"C:\Program Files (x86)\internet explorer\ieinstal.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:3776
-
-
-