Analysis

  • max time kernel
    144s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-11-2020 14:56

General

  • Target

    Calculation-438711349-11202020.xls

  • Size

    62KB

  • MD5

    182d899cffb334cede36bd37a5fc5730

  • SHA1

    9f8745527a3fe95eaa6ce0f37088791c88e4d30f

  • SHA256

    90d873d4a311bcaff6c522cadd137c382aff572144cd2cee4f1873ec851ca8d7

  • SHA512

    aaebd74aafb0f457152fad1e80b2a15fbcdaf85464616e6621dacb039a50b822da7e583492da64aabda1a9cfcedf7450b16a8304862a801f29ca3b6f9bc2e6ee

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • CryptOne packer 5 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Loads dropped DLL 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Calculation-438711349-11202020.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:336
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 C:\AutoCadest\AutoCadest2\Fiksat.dll, DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:928
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn binszvymkl /tr "regsvr32.exe -s \"C:\AutoCadest\AutoCadest2\Fiksat.dll\"" /SC ONCE /Z /ST 16:01 /ET 16:13
          4⤵
          • Creates scheduled task(s)
          PID:1264
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {CDF8D331-50AF-4E31-B528-5DC875F2DBC2} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\AutoCadest\AutoCadest2\Fiksat.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\AutoCadest\AutoCadest2\Fiksat.dll"
        3⤵
        • Loads dropped DLL
        PID:576

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a4b16163e91557b97f4c4b3aa5a65370

    SHA1

    28f85dbb690645b8b5ddb3477284b9d6a634e0ee

    SHA256

    1f1dcdd297bf791cc6f0e06bd23ce64fd99e78b40f0b5f8f896233fbc41427b0

    SHA512

    efa5fb2f180c8b7c925bdc63aef5ea3ea10ac0563e8070a510af5579e233cc25aaa164ffd4bcb9908e1f5acd1e85994a4ebd8592058a073b173fee0a097277c3

  • C:\AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    d6c770067c83a56c438b156f35be5b12

    SHA1

    7ec8853fd5189f5f604fcca5898410231d3ba109

    SHA256

    b98feb7f25738bb91edd7178c1c99ea934e37330e52d4b115bc3cb2faaf117c1

    SHA512

    a55861175f97fdc3fc72ed723d8ce7f504c88f5320ce8c849e5bd69a7079f7cd3acc9d6ed1c4932bcc887a18287d3be810068a7456f4d2ab9c54dac89b8da916

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a4b16163e91557b97f4c4b3aa5a65370

    SHA1

    28f85dbb690645b8b5ddb3477284b9d6a634e0ee

    SHA256

    1f1dcdd297bf791cc6f0e06bd23ce64fd99e78b40f0b5f8f896233fbc41427b0

    SHA512

    efa5fb2f180c8b7c925bdc63aef5ea3ea10ac0563e8070a510af5579e233cc25aaa164ffd4bcb9908e1f5acd1e85994a4ebd8592058a073b173fee0a097277c3

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    d6c770067c83a56c438b156f35be5b12

    SHA1

    7ec8853fd5189f5f604fcca5898410231d3ba109

    SHA256

    b98feb7f25738bb91edd7178c1c99ea934e37330e52d4b115bc3cb2faaf117c1

    SHA512

    a55861175f97fdc3fc72ed723d8ce7f504c88f5320ce8c849e5bd69a7079f7cd3acc9d6ed1c4932bcc887a18287d3be810068a7456f4d2ab9c54dac89b8da916

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    d6c770067c83a56c438b156f35be5b12

    SHA1

    7ec8853fd5189f5f604fcca5898410231d3ba109

    SHA256

    b98feb7f25738bb91edd7178c1c99ea934e37330e52d4b115bc3cb2faaf117c1

    SHA512

    a55861175f97fdc3fc72ed723d8ce7f504c88f5320ce8c849e5bd69a7079f7cd3acc9d6ed1c4932bcc887a18287d3be810068a7456f4d2ab9c54dac89b8da916

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    d6c770067c83a56c438b156f35be5b12

    SHA1

    7ec8853fd5189f5f604fcca5898410231d3ba109

    SHA256

    b98feb7f25738bb91edd7178c1c99ea934e37330e52d4b115bc3cb2faaf117c1

    SHA512

    a55861175f97fdc3fc72ed723d8ce7f504c88f5320ce8c849e5bd69a7079f7cd3acc9d6ed1c4932bcc887a18287d3be810068a7456f4d2ab9c54dac89b8da916

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    d6c770067c83a56c438b156f35be5b12

    SHA1

    7ec8853fd5189f5f604fcca5898410231d3ba109

    SHA256

    b98feb7f25738bb91edd7178c1c99ea934e37330e52d4b115bc3cb2faaf117c1

    SHA512

    a55861175f97fdc3fc72ed723d8ce7f504c88f5320ce8c849e5bd69a7079f7cd3acc9d6ed1c4932bcc887a18287d3be810068a7456f4d2ab9c54dac89b8da916

  • memory/576-15-0x0000000000000000-mapping.dmp
  • memory/928-7-0x00000000000A0000-0x00000000000A2000-memory.dmp
    Filesize

    8KB

  • memory/928-9-0x0000000000000000-mapping.dmp
  • memory/928-12-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1264-11-0x0000000000000000-mapping.dmp
  • memory/1460-10-0x0000000000120000-0x0000000000140000-memory.dmp
    Filesize

    128KB

  • memory/1460-8-0x0000000000240000-0x0000000000260000-memory.dmp
    Filesize

    128KB

  • memory/1460-1-0x0000000000000000-mapping.dmp
  • memory/1484-0-0x000007FEF7D30000-0x000007FEF7FAA000-memory.dmp
    Filesize

    2.5MB

  • memory/1676-13-0x0000000000000000-mapping.dmp