Analysis

  • max time kernel
    143s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    25-11-2020 16:41

General

  • Target

    Calculation-1905798087-11202020.xls

  • Size

    61KB

  • MD5

    d2ccb220ebd1726027a94b8e55f7ea57

  • SHA1

    8863bcc3dce81b2c0fa34c9d5c25bad443159597

  • SHA256

    89ef9b418bfd698c45ec3caac3067d0fb155118de909362afe9dd811f41094ec

  • SHA512

    23964e20b805c840877fd8e4c9f340971f9ea6b7db4d0237590dded6d83753bef77e31f7f2b8398eaeee800ca21f3ead5fc49f45e26d7d349e23a596fff74773

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • CryptOne packer 5 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Loads dropped DLL 5 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Calculation-1905798087-11202020.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32 C:\AutoCadest\AutoCadest2\Fiksat.dll, DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\SysWOW64\explorer.exe
        C:\Windows\SysWOW64\explorer.exe
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn tpzckdmebs /tr "regsvr32.exe -s \"C:\AutoCadest\AutoCadest2\Fiksat.dll\"" /SC ONCE /Z /ST 17:47 /ET 17:59
          4⤵
          • Creates scheduled task(s)
          PID:980
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {DF85FDCC-DD66-4DD0-A4DC-22A139B830CE} S-1-5-18:NT AUTHORITY\System:Service:
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1152
    • C:\Windows\system32\regsvr32.exe
      regsvr32.exe -s "C:\AutoCadest\AutoCadest2\Fiksat.dll"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1536
      • C:\Windows\SysWOW64\regsvr32.exe
        -s "C:\AutoCadest\AutoCadest2\Fiksat.dll"
        3⤵
        • Loads dropped DLL
        PID:1728

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    f5d343037e71550ebb729dfd806a31ac

    SHA1

    9031d3540d785bf863541b8569e7ebe870643f6d

    SHA256

    5d7f7ce899c7e8512820f92666d805bc2614ca0ec16113d13e994417b2d4aad6

    SHA512

    683c300b9c606daff7a20fccd9f1d3b6ba11efd21e44fde998b00713c64b58d047c0620cc389c9ea1aa70e76dfe13c0403c25e48d709069a46abc80bdae5aa96

  • C:\AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a6da7e4343bdf4bf26f736c813aae09e

    SHA1

    32a62c438d86c6c8ceac99c81745a3a03387cae9

    SHA256

    7d0d4aeae3c75b3e47d58a819da26ef58069df925d7dd2e75d94abe910f0e368

    SHA512

    2468ec16cdb93cfa8bc5cb79680f4c33cdbce6f169cfdec3523260492f6fba5860ad1accc278487c9bc680d438c4898f85e3ae9cc03d4f25921a5dd53307b1cf

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    f5d343037e71550ebb729dfd806a31ac

    SHA1

    9031d3540d785bf863541b8569e7ebe870643f6d

    SHA256

    5d7f7ce899c7e8512820f92666d805bc2614ca0ec16113d13e994417b2d4aad6

    SHA512

    683c300b9c606daff7a20fccd9f1d3b6ba11efd21e44fde998b00713c64b58d047c0620cc389c9ea1aa70e76dfe13c0403c25e48d709069a46abc80bdae5aa96

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a6da7e4343bdf4bf26f736c813aae09e

    SHA1

    32a62c438d86c6c8ceac99c81745a3a03387cae9

    SHA256

    7d0d4aeae3c75b3e47d58a819da26ef58069df925d7dd2e75d94abe910f0e368

    SHA512

    2468ec16cdb93cfa8bc5cb79680f4c33cdbce6f169cfdec3523260492f6fba5860ad1accc278487c9bc680d438c4898f85e3ae9cc03d4f25921a5dd53307b1cf

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a6da7e4343bdf4bf26f736c813aae09e

    SHA1

    32a62c438d86c6c8ceac99c81745a3a03387cae9

    SHA256

    7d0d4aeae3c75b3e47d58a819da26ef58069df925d7dd2e75d94abe910f0e368

    SHA512

    2468ec16cdb93cfa8bc5cb79680f4c33cdbce6f169cfdec3523260492f6fba5860ad1accc278487c9bc680d438c4898f85e3ae9cc03d4f25921a5dd53307b1cf

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a6da7e4343bdf4bf26f736c813aae09e

    SHA1

    32a62c438d86c6c8ceac99c81745a3a03387cae9

    SHA256

    7d0d4aeae3c75b3e47d58a819da26ef58069df925d7dd2e75d94abe910f0e368

    SHA512

    2468ec16cdb93cfa8bc5cb79680f4c33cdbce6f169cfdec3523260492f6fba5860ad1accc278487c9bc680d438c4898f85e3ae9cc03d4f25921a5dd53307b1cf

  • \AutoCadest\AutoCadest2\Fiksat.dll
    MD5

    a6da7e4343bdf4bf26f736c813aae09e

    SHA1

    32a62c438d86c6c8ceac99c81745a3a03387cae9

    SHA256

    7d0d4aeae3c75b3e47d58a819da26ef58069df925d7dd2e75d94abe910f0e368

    SHA512

    2468ec16cdb93cfa8bc5cb79680f4c33cdbce6f169cfdec3523260492f6fba5860ad1accc278487c9bc680d438c4898f85e3ae9cc03d4f25921a5dd53307b1cf

  • memory/980-11-0x0000000000000000-mapping.dmp
  • memory/1036-7-0x00000000000A0000-0x00000000000A2000-memory.dmp
    Filesize

    8KB

  • memory/1036-9-0x0000000000000000-mapping.dmp
  • memory/1036-12-0x0000000000080000-0x00000000000A0000-memory.dmp
    Filesize

    128KB

  • memory/1536-13-0x0000000000000000-mapping.dmp
  • memory/1708-10-0x0000000000180000-0x00000000001A0000-memory.dmp
    Filesize

    128KB

  • memory/1708-8-0x0000000000240000-0x0000000000260000-memory.dmp
    Filesize

    128KB

  • memory/1708-1-0x0000000000000000-mapping.dmp
  • memory/1728-15-0x0000000000000000-mapping.dmp
  • memory/1992-0-0x000007FEF6670000-0x000007FEF68EA000-memory.dmp
    Filesize

    2.5MB