Analysis

  • max time kernel
    121s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-03-2021 06:26

General

  • Target

    Copy 7739588.xlsm

  • Size

    366KB

  • MD5

    25e9a6b92afabaadc45bf4b992560bf0

  • SHA1

    dc8c36ee7b976c59b6296482e23e15ea26e19574

  • SHA256

    6fc41047bc11f8152b3d8325985c0559514bf2b78b0aa7281babcfd280b3d9dc

  • SHA512

    67bd048fa92c639533207edf8a3dbfef7e83a4002fd5e5088502a0f276cbd1ddcfc46d2806c888bc3dfb8f77f3809991ccd62d7f2ee03e5fb0dfd14c006fb158

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Copy 7739588.xlsm"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1672
  • C:\Windows\system32\wbem\wmic.exe
    wmic os get /format:"C:\Users\Admin\AppData\Roaming\2354A.xsl"
    1⤵
    • Process spawned unexpected child process
    • Blocklisted process makes network request
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Windows\System32\rundll32.exe
      "C:\Windows\System32\rundll32.exe" C:/Windows/Temp//8n6cs.dll JsRelease
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\System32\rundll32.exe" C:/Windows/Temp//8n6cs.dll JsRelease
        3⤵
          PID:1348

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    2
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\2354A.xsl
      MD5

      f354a093e972b7c0aeaf5d2af6f5a7bc

      SHA1

      af0cc97cdc388fb68e46079ec47618b618c8e93a

      SHA256

      6a43b095453a43f4625ef45d061f38811416bc2cafed58f5848d59b0e8e61edf

      SHA512

      6e44b3f95b0c275442b4b9afe0dcd325f5706c73a7b5adfcf88c38a86f3285a2e20d34ea6d1df00b38dfefb2b7b8c5baefa989491a860e624ec6514a083c3d17

    • C:\Windows\Temp\8n6cs.dll
      MD5

      4cb125c198bf797263d35cff228eb81f

      SHA1

      334bc9118598777c07a6ec794c74d5bbe992b958

      SHA256

      e87f5db58b77055b06f3bd27f32431db7ba6e8e451d341d381e8fb0f939a6add

      SHA512

      8f9dd198201c673ef20991e5b65fc850dea6436764dda92b931a26dbff01752353922ff9a0154f42d0aafeedcfb2c6f0d59282308b0dcee1c5030d806def6c50

    • memory/1052-7-0x000007FEF6460000-0x000007FEF66DA000-memory.dmp
      Filesize

      2.5MB

    • memory/1084-8-0x0000000000000000-mapping.dmp
    • memory/1348-10-0x0000000000000000-mapping.dmp
    • memory/1348-11-0x0000000075F21000-0x0000000075F23000-memory.dmp
      Filesize

      8KB

    • memory/1672-2-0x000000002FAF1000-0x000000002FAF4000-memory.dmp
      Filesize

      12KB

    • memory/1672-3-0x00000000715E1000-0x00000000715E3000-memory.dmp
      Filesize

      8KB

    • memory/1672-4-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1672-5-0x0000000005920000-0x0000000005922000-memory.dmp
      Filesize

      8KB