Analysis

  • max time kernel
    144s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-11-2020 17:46

General

  • Target

    Calculation-1421113288-11202020.xls

  • Size

    61KB

  • MD5

    026e352321bacf5fb2cc6eb4002b26ae

  • SHA1

    a27c9d892aeccb3759fbf71d21404befabbdd431

  • SHA256

    3a8ac2f64fd8b15e4f88db0c54add4fd61e5c17dd5515ada898006169e2f99f2

  • SHA512

    c488011641eeea64e4aa2458631b85ff7a855b89f34153f3f827d249d3022ac198d2a2a295bc210693777acd58349a77c0fe5483e9cd167d7de637c2c8dfd8fc

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • CryptOne packer 5 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Loads dropped DLL 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Calculation-1421113288-11202020.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1880
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 C:\AutoCadest\AutoCadest2\Fiksat.dll, DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1016
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1912
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn rklaovuj /tr "regsvr32.exe -s \"C:\AutoCadest\AutoCadest2\Fiksat.dll\"" /SC ONCE /Z /ST 20:34 /ET 20:46
          4⤵
          • Creates scheduled task(s)
          PID:1148
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5DA828A4-F8F3-49D8-8B25-77CD61B8436C} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\AutoCadest\AutoCadest2\Fiksat.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\AutoCadest\AutoCadest2\Fiksat.dll"
        3⤵
        • Loads dropped DLL
        PID:1604

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    6319f63c5db04ad54979b19df449f703

    SHA1

    3681b2bfae515ea1d6b9724d4e8ba14dfd53c95e

    SHA256

    6eb8888a3edd79b8c6e98d15868d10acdc736dd220441cefe2436bddb0b24ac4

    SHA512

    75398a91f8a9a44cc432f306259738c58ffd999473d354c3d07689a110c02449cd8d9561f7745a830eaecc4bef284c74727fdd02b418f3493ed169abfce885f5

  • C:\AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    0bf8973bea6d4e7a739fdb548d4a8a8a

    SHA1

    83e295a8e10b22ffae875ddd5fe1996544ca422a

    SHA256

    13692b68a7fb451a5016d7ba8ed0bdf82c8fd074de9bafedf6e9252e4e75f827

    SHA512

    7ce2232240b2959e037a6dff0d847b92c7c39acb726e0ab29237bd37ce4ce0dddd45d8ab71c8aa9265ccc73bd252a00c758b87ad886a0d4812fa216d56d02dba

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    6319f63c5db04ad54979b19df449f703

    SHA1

    3681b2bfae515ea1d6b9724d4e8ba14dfd53c95e

    SHA256

    6eb8888a3edd79b8c6e98d15868d10acdc736dd220441cefe2436bddb0b24ac4

    SHA512

    75398a91f8a9a44cc432f306259738c58ffd999473d354c3d07689a110c02449cd8d9561f7745a830eaecc4bef284c74727fdd02b418f3493ed169abfce885f5

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    0bf8973bea6d4e7a739fdb548d4a8a8a

    SHA1

    83e295a8e10b22ffae875ddd5fe1996544ca422a

    SHA256

    13692b68a7fb451a5016d7ba8ed0bdf82c8fd074de9bafedf6e9252e4e75f827

    SHA512

    7ce2232240b2959e037a6dff0d847b92c7c39acb726e0ab29237bd37ce4ce0dddd45d8ab71c8aa9265ccc73bd252a00c758b87ad886a0d4812fa216d56d02dba

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    0bf8973bea6d4e7a739fdb548d4a8a8a

    SHA1

    83e295a8e10b22ffae875ddd5fe1996544ca422a

    SHA256

    13692b68a7fb451a5016d7ba8ed0bdf82c8fd074de9bafedf6e9252e4e75f827

    SHA512

    7ce2232240b2959e037a6dff0d847b92c7c39acb726e0ab29237bd37ce4ce0dddd45d8ab71c8aa9265ccc73bd252a00c758b87ad886a0d4812fa216d56d02dba

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    0bf8973bea6d4e7a739fdb548d4a8a8a

    SHA1

    83e295a8e10b22ffae875ddd5fe1996544ca422a

    SHA256

    13692b68a7fb451a5016d7ba8ed0bdf82c8fd074de9bafedf6e9252e4e75f827

    SHA512

    7ce2232240b2959e037a6dff0d847b92c7c39acb726e0ab29237bd37ce4ce0dddd45d8ab71c8aa9265ccc73bd252a00c758b87ad886a0d4812fa216d56d02dba

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    0bf8973bea6d4e7a739fdb548d4a8a8a

    SHA1

    83e295a8e10b22ffae875ddd5fe1996544ca422a

    SHA256

    13692b68a7fb451a5016d7ba8ed0bdf82c8fd074de9bafedf6e9252e4e75f827

    SHA512

    7ce2232240b2959e037a6dff0d847b92c7c39acb726e0ab29237bd37ce4ce0dddd45d8ab71c8aa9265ccc73bd252a00c758b87ad886a0d4812fa216d56d02dba

  • memory/1016-8-0x0000000000180000-0x00000000001A0000-memory.dmp
    Filesize

    128KB

  • memory/1016-10-0x0000000000140000-0x0000000000160000-memory.dmp
    Filesize

    128KB

  • memory/1016-1-0x0000000000000000-mapping.dmp
  • memory/1148-11-0x0000000000000000-mapping.dmp
  • memory/1604-15-0x0000000000000000-mapping.dmp
  • memory/1616-13-0x0000000000000000-mapping.dmp
  • memory/1912-9-0x0000000000000000-mapping.dmp
  • memory/1912-12-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1912-7-0x00000000000A0000-0x00000000000A2000-memory.dmp
    Filesize

    8KB

  • memory/2008-0-0x000007FEF7810000-0x000007FEF7A8A000-memory.dmp
    Filesize

    2.5MB