Resubmissions

19-01-2021 16:47

210119-x991whxbve 10

19-01-2021 16:35

210119-4q8sxtj67a 8

Analysis

  • max time kernel
    265s
  • max time network
    240s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 16:47

General

  • Target

    PQ_7498.xls

  • Size

    33KB

  • MD5

    20ce34e6dfd1f17d5e1e8564167c23bd

  • SHA1

    984045d9a670b781f4712611c87cc191380ef6f9

  • SHA256

    f9adf499bc16bfd096e00bc59c3233f022dec20c20440100d56e58610e4aded3

  • SHA512

    ef7fddfbbdb40f6b75d838397cad454a51822cbfec5e2dfbb8401784c518de74e9d707f9c44db2054be208735dba903035f1b75d7384fec5dc4c78275494514b

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://indiamedicalshow.com/visitors.php

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • JavaScript code in executable 2 IoCs
  • Process spawned suspicious child process 1 IoCs

    This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PQ_7498.xls
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Users\Public\Documents\KsB.txt,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      PID:340
    • C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE
      "C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE" -x -s 952
      2⤵
      • Process spawned suspicious child process
      • Suspicious use of WriteProcessMemory
      PID:1192
      • C:\Windows\SysWOW64\dwwin.exe
        C:\Windows\system32\dwwin.exe -x -s 952
        3⤵
          PID:1716

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Public\Documents\KsB.txt

      MD5

      096866e5ba5e052f84c51771671e344b

      SHA1

      27c1c50f9ff599a9adae5a52ee78ca0fbdb7a09d

      SHA256

      5c421c78397470da8cf840b87dcbcf2495911ac03c5d02b8bc332e6a624b2261

      SHA512

      268eac63794bcaa73d5b0f35b8fa736b6e72235f238db283877009f9cdf3192216a28cebe11e2a69bc0c1e988a91b8b2aa71ba0e4147c09efb395d816b6a3aef

    • memory/340-6-0x0000000000000000-mapping.dmp

    • memory/340-7-0x0000000074B31000-0x0000000074B33000-memory.dmp

      Filesize

      8KB

    • memory/404-5-0x000007FEF7080000-0x000007FEF72FA000-memory.dmp

      Filesize

      2.5MB

    • memory/1192-9-0x0000000000000000-mapping.dmp

    • memory/1668-2-0x000000002F401000-0x000000002F404000-memory.dmp

      Filesize

      12KB

    • memory/1668-3-0x0000000071001000-0x0000000071003000-memory.dmp

      Filesize

      8KB

    • memory/1668-4-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/1716-11-0x0000000000000000-mapping.dmp

    • memory/1716-13-0x0000000001EB0000-0x0000000001EC1000-memory.dmp

      Filesize

      68KB