Analysis

  • max time kernel
    79s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    11-03-2021 21:44

General

  • Target

    https://drive.google.com/file/d/11krsKw6Il3FgXhq0fQVfbiqVYp19XnzB/view?usp=sharing

  • Sample

    210311-6q3g6zejhn

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source

Signatures

  • Suspicious Office macro 1 IoCs

    Office document equipped with 4.0 macros.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 57 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://drive.google.com/file/d/11krsKw6Il3FgXhq0fQVfbiqVYp19XnzB/view?usp=sharing
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1932
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1800
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1932 CREDAT:668676 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1480
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:804

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Command and Control

Web Service

1
T1102

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    1c67b61dfb1d4a83dd74fd8eff0c5e52

    SHA1

    820c04757e835e414c397b65fc95469eacb973d9

    SHA256

    8a2f0234c33e0bbb8b74259d870a1d3689a85fe160d3c4c8af8160051d979777

    SHA512

    abfde59d2649ff9ac009184b87eaed50d4ec3d1774075cd3e0a124a25b5552dd3ba5cd5a04908def0e4cf6907f191be52931413561894ba0578971d19e8304d0

  • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\w5ukms8\imagestore.dat
    MD5

    88d5acb86f9de587a9bb704d9343bdee

    SHA1

    75b12fd88b0975665a00bed1460c0d6bdba317d2

    SHA256

    65afae60fa5685ef373f0468d3de5183116f5a3db07343ae751922846113d2e4

    SHA512

    ef6fad5d8a4fac1f4782b8d42bbf7b7805a46fbe13b7a21e5381d43d9608f179e3beed743512f34b5c544cd28f8dfc4ceaa26d422ffe089ca5d8e99969b9607e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\OMGUDWI7\45340.xlsm.b1q6u18.partial
    MD5

    9b632bcee0e0f7c7b284f310fca3d724

    SHA1

    68d4a30d326fb48a44df2c020e59c5579779c18d

    SHA256

    326f7eeebdab427a01af2d2b831b8534c53f6558104462a809ed766ba7c4fcf0

    SHA512

    a89140d555a1818116f348441f22eccdde36806ca85a742d32a3f575b8fab71ea7d30301030451364d3392bdb3fdb33b4e06b753ebbf9e61c786df199ddc9d89

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\F0Z66OCT.txt
    MD5

    33331b7f4a10aa6f8bc9fac844f54f01

    SHA1

    287e381e13cc349d9f8949b8b33ba5200950e3b6

    SHA256

    301a6293f6a78c9c2c99db486125fab525f009941faf20866536fb6dcc1314ae

    SHA512

    adb2f6e3097dad0bc67375ac830998abea5d3b3e1cc3c0c70a577edd1ac46f84f593bb637dba5f2c6c063a962eda14d89a8f169676ac4e856b772a00be5ebf90

  • memory/804-10-0x0000000000000000-mapping.dmp
  • memory/804-13-0x0000000002090000-0x0000000002091000-memory.dmp
    Filesize

    4KB

  • memory/804-12-0x000000006E5F1000-0x000000006E5F3000-memory.dmp
    Filesize

    8KB

  • memory/804-11-0x000000002F7E1000-0x000000002F7E4000-memory.dmp
    Filesize

    12KB

  • memory/1480-5-0x0000000000000000-mapping.dmp
  • memory/1480-6-0x00000000750C1000-0x00000000750C3000-memory.dmp
    Filesize

    8KB

  • memory/1800-3-0x0000000000000000-mapping.dmp
  • memory/1932-8-0x0000000004BD0000-0x0000000004BD1000-memory.dmp
    Filesize

    4KB

  • memory/1972-2-0x000007FEF5BC0000-0x000007FEF5E3A000-memory.dmp
    Filesize

    2.5MB