Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    04-08-2020 16:42

General

  • Target

    del_info-W8629822.xlsm

  • Size

    238KB

  • MD5

    ee54cfcfb1a4f10f27b597a37fbb33de

  • SHA1

    06b40ca6f7013057c4bc243c8636345e9aac786e

  • SHA256

    b7570f67d3d5a587e48f30fe62f2f2f04f60b65a21216a86ec062babc5a05fa6

  • SHA512

    4d9dd8cdddf14d8dd2a91d0bbf09945d6bfac9c5e25e67ae01c02b4309351bc079b85e319beed10b19dad11151f926bd3331c2fecd28466bc543eaf35e8877d4

Score
10/10

Malware Config

Signatures

  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Blacklisted process makes network request 4 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • ostap

    Ostap is a JS downloader, used to deliver other families.

  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of WriteProcessMemory 2 IoCs
  • Ostap JavaScript Downloader 1 IoCs

    Ostap is a JavaScript downloader that's been active since 2016. It's used to deliver several families, inluding TrickBot

  • JavaScript code in executable 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\del_info-W8629822.xlsm"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Enumerates system info in registry
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • Checks processor information in registry
    PID:728
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Excel\ms.fee.d\desktop-ini.jse"
      2⤵
      • Blacklisted process makes network request
      • Process spawned unexpected child process
      PID:3200

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/728-18-0x00000206DF865000-0x00000206DF86E000-memory.dmp

    Filesize

    36KB

  • memory/728-14-0x00000206E640E000-0x00000206E640F000-memory.dmp

    Filesize

    4KB

  • memory/728-19-0x00000206DF865000-0x00000206DF86E000-memory.dmp

    Filesize

    36KB

  • memory/728-13-0x00000206D4BE8000-0x00000206D4BE9000-memory.dmp

    Filesize

    4KB

  • memory/728-20-0x00000206DF865000-0x00000206DF86E000-memory.dmp

    Filesize

    36KB

  • memory/728-16-0x00000206E67C2000-0x00000206E67C5000-memory.dmp

    Filesize

    12KB

  • memory/728-17-0x00000206DF865000-0x00000206DF86E000-memory.dmp

    Filesize

    36KB

  • memory/728-21-0x00000206E6D60000-0x00000206E6D6B000-memory.dmp

    Filesize

    44KB

  • memory/728-12-0x00000206E6A5D000-0x00000206E6A66000-memory.dmp

    Filesize

    36KB

  • memory/728-11-0x00000206E6CF4000-0x00000206E6CFC000-memory.dmp

    Filesize

    32KB

  • memory/728-7-0x00000206DFB11000-0x00000206DFB1C000-memory.dmp

    Filesize

    44KB

  • memory/728-22-0x00000206E6D60000-0x00000206E6D6B000-memory.dmp

    Filesize

    44KB

  • memory/728-23-0x00000206E6D60000-0x00000206E6D6B000-memory.dmp

    Filesize

    44KB

  • memory/728-24-0x00000206F13A0000-0x00000206F13A1000-memory.dmp

    Filesize

    4KB

  • memory/728-25-0x00000206E6D60000-0x00000206E6D6B000-memory.dmp

    Filesize

    44KB

  • memory/728-10-0x00000206E6CF4000-0x00000206E6CFC000-memory.dmp

    Filesize

    32KB