Analysis

  • max time kernel
    142s
  • max time network
    140s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-03-2021 19:10

General

  • Target

    666f323aaaeb3ad7c537561f66d74132.xlsm

  • Size

    187KB

  • MD5

    666f323aaaeb3ad7c537561f66d74132

  • SHA1

    478f0bb55cef539818bffde3dc7f3175c29bf2cb

  • SHA256

    7f322b2e240f3dfc09f4be7d9cbc806feb902587fbba27520d4d8641c6fa683c

  • SHA512

    2caad2f2a45683475637dc331016be9ac642ea3119f7265d6d76a6994153ce88e14ba9985664231c3e48e0f52f94a6506f90d1ce4ea800dfc7e6e056596955ac

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 42 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\666f323aaaeb3ad7c537561f66d74132.xlsm"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1456
  • C:\Windows\system32\wbem\wmic.exe
    wmic os get /format:"C:\Users\Admin\AppData\Roaming\27041.xsl"
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3936
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:/Windows/Temp//iqlns.dll RunXml
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:/Windows/Temp//iqlns.dll RunXml
        3⤵
          PID:1652

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\27041.xsl

      MD5

      6e5e3a0f3b3e45d2b8aa4872750a5b21

      SHA1

      43322560fb8685b61946dd7dc7e2ab8bc6522807

      SHA256

      4679aecd0ebdca18aecc3df289e29557ad36e8530cae3628a5de5985f43d808d

      SHA512

      0d0d017983dbb1e4def10ffc465416bead0be6af556eae45859e14390a646449f3b3e7069588393f4747409e7abc38a2804dd93846e7351b1bfab5209f38e260

    • C:\Windows\Temp\iqlns.dll

      MD5

      38ff27fe8a92379cbdfdabc07d111a90

      SHA1

      cd340aae7738b9aae1e2898509c364a3d1ff9087

      SHA256

      5c0757f27a6ad23fb98bf1833e2d8a42f030cd81a0a921f8ae267ed24d15aa57

      SHA512

      6d468522ced4961da1618e80784e88db4de310c77aeb53a4df6b05d662ac495830c5dbc0d385e37c10be47285b786ab5ad0eed2c5a6edbc2e4b7958751c30c2d

    • memory/1456-2-0x00007FFB33400000-0x00007FFB33410000-memory.dmp

      Filesize

      64KB

    • memory/1456-3-0x00007FFB33400000-0x00007FFB33410000-memory.dmp

      Filesize

      64KB

    • memory/1456-4-0x00007FFB33400000-0x00007FFB33410000-memory.dmp

      Filesize

      64KB

    • memory/1456-5-0x00007FFB33400000-0x00007FFB33410000-memory.dmp

      Filesize

      64KB

    • memory/1456-6-0x00007FFB568F0000-0x00007FFB56F27000-memory.dmp

      Filesize

      6.2MB

    • memory/1456-7-0x000002029AF00000-0x000002029AF04000-memory.dmp

      Filesize

      16KB

    • memory/1652-11-0x0000000000000000-mapping.dmp

    • memory/3952-9-0x0000000000000000-mapping.dmp