Resubmissions

28-02-2021 17:05

210228-pjgnbjwth2 8

27-02-2021 12:13

210227-bpkha5za7s 8

27-02-2021 04:19

210227-7c1xkzg346 10

27-02-2021 03:32

210227-2xwvzgykxs 8

27-02-2021 03:29

210227-qgrlcph782 8

27-02-2021 03:16

210227-k82qfdjlve 8

27-02-2021 02:45

210227-mjxh7bv4wj 8

27-02-2021 02:23

210227-w6qfkjy5ha 8

27-02-2021 02:06

210227-r385kvgs32 8

26-02-2021 23:10

210226-yds8gthfax 8

Analysis

  • max time kernel
    150s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    28-02-2021 17:05

General

  • Target

    Doc_3744.xls

  • Size

    62KB

  • MD5

    47e22049644647ee854cedfe077156e7

  • SHA1

    20ad9f47616a8272dece2ec1039a88c09412c97c

  • SHA256

    5f2adacaf4ecb00ed24dd9dfe355307d0d6e786e40c945ad4c6d1ae3a4835d2a

  • SHA512

    1eeb87173378f4d0e157ee42f5b28e48ff84a35b44d71f004a6180cc2bdbc09e45c071adc7ab0a94c75071fbe3ee13b939ee8cb216b6f2e06c9c24ca34dbbf1b

Score
1/10

Malware Config

Signatures

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 27 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Doc_3744.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:880
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:648 CREDAT:82945 /prefetch:2
      2⤵
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2116
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:648 CREDAT:148483 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:4300

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
    MD5

    fad1912705152d4e8a7f19863642e54a

    SHA1

    3dfe110938a949e9101a144d828f48e5b8382273

    SHA256

    a06231c49dd276d23a3e013b6736959b10ff8b87c74506228f134e74611cfaf9

    SHA512

    81c8a11b779cbc739aacb06268c860a79141d6ca468d3b205a13daa0b6663a8a7b5c9e3a28bf3b7df819570ec1a9a17719a21234258fd9b7b898b6a9166f7d97

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    MD5

    da973b897f7f327c95068b3380d1018c

    SHA1

    9b64afa36695d70cc201cdd99a771759f699d643

    SHA256

    bb7c13af9f0ff2fb33ee8d506bc441d71610f5c1dda28e6aa3aa5b2cdc7bdc1b

    SHA512

    1f064eff65be5acc41240005f9a642674f8f7efd52307a4030511d93505aea1da43598f55a3eb8bfcb18fa3339e4f69c4b7933180a62aeb12850fc37de2872ce

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    f6df495484441667b60473e850407c92

    SHA1

    f21ac8545b1ebee79a2f7f0149b415bd98c99ba0

    SHA256

    e121a52b627c360713e3a46510fa1d7b9d3b20a14f0725e74933e497241d6c55

    SHA512

    12f020f1972ae506263f62a3293cf5e655643d56994454419383bf68669370bcb6491628e8ba16e1f0050e0ac160178ebd22f09defa5a97290279d48129bcaaf

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\9FF67FB3141440EED32363089565AE60_2B5D1D05F8C5796FEC0C4563E73619A2
    MD5

    b00b6319479ad62dd308813dcfe77dea

    SHA1

    27b52b82c0b70ba96c40a090b5f675f3471cebf6

    SHA256

    78c9a2bd0c50df21d851f997627c2d8296fc748982a5a96f34853c56da70f092

    SHA512

    fadea2796a2afe6efebded72c686ca2e7ebc3dd91c88d4bb858ddf0bd1be7f345572f662d3ebb315407637c6fd3e75febbfbb976834a7499a712b3004b951427

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_3426F52F4D8B143AC417A5844A0179C5
    MD5

    60b31566848276be1c66bbc2cce90c94

    SHA1

    8471a00f5c81dd28d3fa8541636ac901607d8e1e

    SHA256

    f01662d56cb7979b5d81e706ba5c03274f2093da4208bedeeff5859597cb7340

    SHA512

    332481c64669967d38456d152d41a17fd295c1da40de080607e2a0899bcad1de9ec0f28ed50f96f27b436f57233d96c1dc5bf4bfb615e49785a9e4460f5cb0ee

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
    MD5

    48d7b88f7986388169c9f46bd8d48050

    SHA1

    f34113edae5d2fe7046d9250a019bc19cf6534cc

    SHA256

    679a3247b5f50991c3aef6f491cd5a5b0c55f11693a886f6a7cfed811f108cc8

    SHA512

    fb43568a8419777a45ebf4a6325e3c256ce0c464fc9ecb88fd924709aa0ab2b631c027fc258e66e1fc5616f4d252029d926d31b29c445c8af31e4aa70fb0d21c

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
    MD5

    c4033bbdca4283f7bdeaa83abbd54ee1

    SHA1

    cda4fc3b88401369f5866e464b8380d7e937e2e1

    SHA256

    cd0f46c637cc9f8dcd99e56043bcc7a0a24355cb7f54dd5017c1da7b8027422f

    SHA512

    ec7c41ce0ab5bfaf1c7a83e7b94eab53ea5e458f3b8aa6daa30d246a5b6e8786d6aa1461403d34c7fd6c441ba4df39eae3db2da93b4358d3adfe72c4267d2853

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27
    MD5

    b1046afb5e2388a5880ed135c264f03d

    SHA1

    60fca5ba776a0830ab8f72fecaf525a75bbd58ad

    SHA256

    fd33e8c65f0754ab7bd09ca9d1c5f7752b252e3cac377e5fe235410c3f643c42

    SHA512

    37fb68950c3014642865c2ef5dfb1ce24f3d6c19b1e18bd64d59a91e4cc11be7d8cd0b1f986a63ed7897c8da161802b289bb06835cf88fc7b0091fb516e07498

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
    MD5

    b896d8749310d92e6fd9e14498e19a93

    SHA1

    4f8ae9d545f0502ab19221021c62ad8db86e41f9

    SHA256

    69c05d966dee9fe18542c14681952978e5db74b2c5dedfa447a5d929bee53b9b

    SHA512

    a50c8481e834553d5ebc51a698084d3b9e5230edb7fb57beb24b0306156624a5c9953c8749266ded68a256578eec92d7a35439ba36325504f25f6f0a39392f73

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_2B5D1D05F8C5796FEC0C4563E73619A2
    MD5

    197b4afefea316db38648327821a876a

    SHA1

    421c78a5d2ad1898783009092ba17ca687a1aa34

    SHA256

    97110e1ede178db1a1c58fb55f0ca850d952b7e5d9fd91b3fb8ebae37058d79b

    SHA512

    26f1e0f4c2deec33a1917118dfc694b2f67a4df9a5c5e477f56a01475c717ac3d0c36a40e13d33d3ea001312710005cec216e9abc55d6adce3779df7203a9809

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CC197601BE0898B7B0FCC91FA15D8A69_3426F52F4D8B143AC417A5844A0179C5
    MD5

    cc3b7f11008d9eaa0b7dbf0b690f0056

    SHA1

    23583439fd2914a4f93eee598cfffbe500ba31e2

    SHA256

    a0c6bde0a9637cf3c9d5607f90634a39eef812ba57af993078930c11136d5ef7

    SHA512

    c9aab3c43c47579978f2a8ea66bd5c05ddaa5ce2ced67eb53c43fd1c0171d45943b0226dd2d3fb91bbeaac0732426077e62d8592f74afd511afba01a1088e508

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\CFE86DBBE02D859DC92F1E17E0574EE8_46766FC45507C0B9E264E4C18BC7288B
    MD5

    2d548124572eb1f66d27d76ce508ecc5

    SHA1

    b85e049e144f75881ae203c9340526a95123b9c4

    SHA256

    9029df54242434e2ec9b67a93223e52ee56136e79d9b20bfaa224ff096fbd688

    SHA512

    60bf1b0d16994f7d5a240be24695ab0789b5210f4bf3b870d5298af1fd3efbc207397bc7d2f20e00dd91e9c46822b65441275cea3328a383d8a4b591ec37dee4

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6FP683PO.cookie
    MD5

    fdc8b882899ba329829c2e6d39a8efac

    SHA1

    eefad4185d487394ff7a2cfc1b485be8760a0089

    SHA256

    6f0c2e3e8a221d885440c54a9b02105e2acd7be08235216619cf4db58e4c11af

    SHA512

    d2e499f007ad45b4c42696bf2f21aa1a1fc0540cb07f2074ea9aa7d9cb6035a737b1bebdc87b79bd01ff2ea2a89669c31345edda10c8ad5125bb14f48394f731

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\6T87U727.cookie
    MD5

    6895685424017ed0a4ce4f7930b05c23

    SHA1

    e3bb78570dde86cb60e218e98a604403e07015df

    SHA256

    384256e96fe046805c5868b4f83a787fff9bfeaec9160e0f779f72e7b15ff0c6

    SHA512

    6e812e0b7649d0dc74d1df991b8c6367309acc3009b2fad680a9ad3f89b07481bce9d676173abcfde640cc46535520d6b695fe748b68e0bfff10fda142036eac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\8L35UP3B.cookie
    MD5

    3f259926fb7a479f77cb2e64c23679e4

    SHA1

    159ad03c425a09f9f7bb15991c5db804833c1fdb

    SHA256

    d62e2d27c09977cb1342359f408e1681cf54c04c04ac4412fa82cda67e3f8c12

    SHA512

    ccd4ad65632a73365b97e8f3725987c3c0e20829f073db31561812b251de3db07d3174d14fbdbf14a3a22e7c098f8b8943154d10cb2e112a50b698866a1db43e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\9PTTAO1L.cookie
    MD5

    f0491b200249c79f93e1e5e82ee71f89

    SHA1

    33ddd0fb636e9bf7c5d10d3395b4c92425dc1d1b

    SHA256

    5a2ab33e5bc7c7c128a62b75e17dde2e24dec2dda9499d955ba57b62be8bbc6e

    SHA512

    c139a7c22b2f6c1360292c47e72abef86de084f6379eb9745cbe729a5e3a6d200bce8b87f93d536fef41c9419994e013ff800f39ad9bb68a6dfcfbef0e58e0af

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\CRHTDZL4.cookie
    MD5

    04ddd78df8395f7dbfa54cd3d4ac6189

    SHA1

    c665e5664bd5cee7d7bea5c417dfaca49eb032f3

    SHA256

    9aac365fddd2141d939327c3617828979ce0b1dd67e82a514984a71e5cc11aae

    SHA512

    36ac71b2ec6dcbb0ff8581fec7cf20fd78cdc423313b6a03ef67c84ad3c165a7441bde97b9419260e012b531cbe6aa58dbb1c1e1a43172687df628f51a7a4581

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\DBVFYETY.cookie
    MD5

    634f8e11270d80339a8be43a9d0c1b59

    SHA1

    1e4f3288c8ce3f8af2a7e2292351b9d04d3285af

    SHA256

    a5bed367b64ac4a61f44b54f29d8042640de86ee3e3670b4ef995f022ab96c99

    SHA512

    24584ab44e7731a3e847e4d1f5d6e82f1f42b0b6484127782347dac90179037ea259cb5f533180319d73b043b21978035335ece983fbf291ae9dc7045013fbbb

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\EI5QSHJD.cookie
    MD5

    359d9732da0c17ebe8fe83e122ab973b

    SHA1

    5d3b6fc69ee14b5c5717d4064ebd7c5758669912

    SHA256

    457ae4bbfb5ebe715b26c4146d7afc9b7968e95e972274242cd9769d72c1d881

    SHA512

    4e860257909b945eb45c86d0622944285f79d0aca450e45d0bb243555f2e0ffc1d646230049c4f49977c2b6046bfd8e1ac69d08a12997a06a77345318f867a79

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\H2JEQRY1.cookie
    MD5

    ad13ab01e78ab1fb8f78283082605b33

    SHA1

    9261ca17a606ae2b9e12915f7d1bcf87d029612a

    SHA256

    f0ea402f5131947de4d15f2b4a3b30366a9e876ba7dc0cdec7a5911e02c67d2a

    SHA512

    37fc87b5c52d9a7fe1e211d875ef227eac90bf576b42c296a23e27b444cbcada58b7974b533f3cb622d9bb3326ff1348687015775acdc3bfb3a5bef73cd0ea5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\MCE5JD2N.cookie
    MD5

    909014965011967b4f17bae8c8adebc4

    SHA1

    9995249de7e4ff301338384f05d8070784e63aa4

    SHA256

    670e5335e742d38224886c67c15df3269488c1264fd8f02d6cbd269342710c31

    SHA512

    f0b352726550e8535a19a9bf4c2d398b547f7e02c95ecdb8f1a56ea74b2c8198ecc5928da568241dc9cd95728f61396dea74d2bce6d977211e3fb52a80991f5a

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\OXCAWSPK.cookie
    MD5

    60d1dad69db1fa0ebd3ef2fc0817831d

    SHA1

    106a6990f58871a9ff64d49648ab11eca2bfd0ce

    SHA256

    5e678a460cff6fb60766e174b434b91f3e0ea3b46ee266642261f5a78055ce14

    SHA512

    149ae6d9d8c559d2b95467dd318b46c5f492d996e57319e7e18dd31eb712632fe1feec7433b4bda68deeda6c6e2f24915a90cc27fb804fb3f0e2d694ec740ed1

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCookies\SS971RQY.cookie
    MD5

    62374d5b837de495db722b0d89de1e94

    SHA1

    8c05841a7d550c385d94edc2a1a3e69ec2983bc9

    SHA256

    8e92ae140afb21fa162875f1ec34a13d36e4477f31135b3b36eaa0a802263b9b

    SHA512

    ef5faa6c324a5c869cc5c4a938bee056bf96c1669b95af6b29796ed6e6a0e898e2bb65f575b1b11dfb85e8a4a1ae1d9b3eb153c83fe9d7a5f4103c6a8f265f42

  • memory/880-6-0x00007FF9433F0000-0x00007FF943A27000-memory.dmp
    Filesize

    6.2MB

  • memory/880-2-0x00007FF920240000-0x00007FF920250000-memory.dmp
    Filesize

    64KB

  • memory/880-5-0x00007FF920240000-0x00007FF920250000-memory.dmp
    Filesize

    64KB

  • memory/880-4-0x00007FF920240000-0x00007FF920250000-memory.dmp
    Filesize

    64KB

  • memory/880-3-0x00007FF920240000-0x00007FF920250000-memory.dmp
    Filesize

    64KB

  • memory/2116-7-0x0000000000000000-mapping.dmp
  • memory/4300-10-0x0000000000000000-mapping.dmp