Resubmissions

28-02-2021 17:05

210228-pjgnbjwth2 8

27-02-2021 12:13

210227-bpkha5za7s 8

27-02-2021 04:19

210227-7c1xkzg346 10

27-02-2021 03:32

210227-2xwvzgykxs 8

27-02-2021 03:29

210227-qgrlcph782 8

27-02-2021 03:16

210227-k82qfdjlve 8

27-02-2021 02:45

210227-mjxh7bv4wj 8

27-02-2021 02:23

210227-w6qfkjy5ha 8

27-02-2021 02:06

210227-r385kvgs32 8

26-02-2021 23:10

210226-yds8gthfax 8

Analysis

  • max time kernel
    38s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    27-02-2021 03:16

General

  • Target

    Doc_3744.xls

  • Size

    62KB

  • MD5

    47e22049644647ee854cedfe077156e7

  • SHA1

    20ad9f47616a8272dece2ec1039a88c09412c97c

  • SHA256

    5f2adacaf4ecb00ed24dd9dfe355307d0d6e786e40c945ad4c6d1ae3a4835d2a

  • SHA512

    1eeb87173378f4d0e157ee42f5b28e48ff84a35b44d71f004a6180cc2bdbc09e45c071adc7ab0a94c75071fbe3ee13b939ee8cb216b6f2e06c9c24ca34dbbf1b

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 4 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 61 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 64 IoCs
  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 20 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Doc_3744.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:4684
  • C:\Windows\system32\cmd.exe
    "C:\Windows\system32\cmd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4440
    • C:\Windows\system32\reg.exe
      reg export HKLM 12.txt\
      2⤵
      • Checks BIOS information in registry
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1768
    • C:\Windows\system32\reg.exe
      reg export HKLM 12.txt
      2⤵
      • Checks BIOS information in registry
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:1896
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2212 CREDAT:82945 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:232
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:4148
    • C:\Windows\SysWOW64\DllHost.exe
      C:\Windows\SysWOW64\DllHost.exe /Processid:{AB8902B4-09CA-4BB6-B78D-A8F59079A8D5}
      1⤵
        PID:1940

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      3
      T1012

      System Information Discovery

      3
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\12.txt
        MD5

        910526eb1da6dc258969d3019ac41762

        SHA1

        8abfc7335569242dcb8979d883088efc7a293770

        SHA256

        45a2a1ea43021ec4d65b40036f29079fa97c2f40ba0bb39273b6c83161f575b9

        SHA512

        502a4c5c2ed9bd68f9be7b0e14d8d0f1d350956d53a362f9143bf9fb389106683e054e8ddd389e36767561db90730980a1bc486a85dc0e0a3fdee9a7d2912d62

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
        MD5

        645278e32992298d7366e4e0ac9a360d

        SHA1

        14aa557d892ebdf5337e91b9b9ea8ba4e1ea7e50

        SHA256

        69f5ccba9de478a6e724aa9f26765151fa78b096ede32f599945cb192f61c1b4

        SHA512

        9b5922ca42eccbe5808ee4952e8978e6ec8d819db4a63f9283f560fea54bd01ad51dfc146e1238a067f45b5bfd3603fe43e81b850f35833a836d015c7720e024

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
        MD5

        287448624c876ad9f10c94b9a4c88046

        SHA1

        988368e8881c6e4b02a9d2b64bf0f8951fe2347a

        SHA256

        912350454fdce792501156b813e58c4aa0e7404dda4ea1420d6369869e3579b0

        SHA512

        ce50d816bed7df110698cf8749653effb592c27e3ffa2ba4d4d8397529f8caa05f279060a2c6b6266a9684d6ec240fa286b936f22e189e9a475c660034783d65

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
        MD5

        529614e8964253ec3c23f85247139a4c

        SHA1

        70c56fdd161c0735ee91e198e7e23de33dbf1bb8

        SHA256

        216d715a972d557b7fddf7e5ec025656eb1812c736c7cdc00764b93e81403a47

        SHA512

        583a8eb2ab28893c0d1d26e0c0cb8cf2de32cd42d45701f01e329149aa806ab19a2a7e8f43521a42417902b0b2b83c0cd6322cf6320dde077b61de96411a3b8f

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
        MD5

        47f2c07868cc0b4f9aaa68260d2ccbd5

        SHA1

        92c5ebb86c84ac3a4a7edaadf961af7bd837360b

        SHA256

        b7e2d7a625a01e28b97b91e914d2bcd1ad71e558a8fa5b279190f8ad802da0ca

        SHA512

        4d057bd728a5967605d587ccc4e8eadeff32eb114e1568b2df8646a6eda1e0691ad931c822b0e2db298d97785d93431d94c53fe7214c315d9d59a4f2be85b7a0

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\0Z2GBTCE.cookie
        MD5

        61ff6c1dd856e093ce7b19679b595c1c

        SHA1

        bac9674dd43e8676c354a085ea8df2fb0724f7c8

        SHA256

        51cea5bbfa9303ee5a0ce89277cf9d468d5e176209f926caf5230dd1178faf6c

        SHA512

        44e3dbf78d862f9e144062bf78f87fdb8d49d159eec3135f452c9e89f45410e8a889ef2552ce04debee574eb25e3fa80e0b9675e4904d72a8f3487b4bb289a7e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CP3JD34G.cookie
        MD5

        cf51c598c2b462881a0025e4a8e4760b

        SHA1

        f3a3c8bf0b2880bef175751871e3deb8b49b04fc

        SHA256

        e7e51faf1ccd5b7c83eae96d5153bf0485d9aadb5001ade573a52c2a8c8c2100

        SHA512

        d12aec64d1d385e95b546f2b15308dd07950b17299458118adcb85dbf2d7c7e9f4ccabcf7e49a27a85e85705abea47f215d4b18a02a7e8e6abee9ab47680043b

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\ZH0AVNTB.cookie
        MD5

        cc4c277206b917942a37d86131082683

        SHA1

        05702284003e8e5f54493786cfe6cbdf45a7c094

        SHA256

        46a18b15b7583c5bb6e988499aaa029f1a05a440462b857cab4a8f823cc21d3f

        SHA512

        3be5426be53c05cce22b43f906578b461cd03d8c24635c25d2cca8454be916f67b9f22be843002f5b973b8ceccddddeecca77087f30416b46838c165fbf2ee0f

      • memory/232-9-0x0000000000000000-mapping.dmp
      • memory/1768-7-0x0000000000000000-mapping.dmp
      • memory/1896-8-0x0000000000000000-mapping.dmp
      • memory/4684-2-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
        Filesize

        64KB

      • memory/4684-6-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
        Filesize

        64KB

      • memory/4684-5-0x00007FFEEB2F0000-0x00007FFEEB927000-memory.dmp
        Filesize

        6.2MB

      • memory/4684-4-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
        Filesize

        64KB

      • memory/4684-3-0x00007FFEC57A0000-0x00007FFEC57B0000-memory.dmp
        Filesize

        64KB