Analysis

  • max time kernel
    135s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-03-2021 15:03

General

  • Target

    Documents_2014081229.xls

  • Size

    273KB

  • MD5

    63a68ba95fca6c9b586b1b7aaa8181df

  • SHA1

    afc6a930be981fea43f942f0fb7b71cf941d573b

  • SHA256

    efb99dabdc2014a65a03044be4e477a643c4cbae9e02ec184ace4f212860898f

  • SHA512

    fecb625fb7a6befcde453ff4b3792dfeed5dde73d8ba73096faafdbc9b092271cd344a4cdd7b2f9538255d58151e4a3a70bf2f4b680110881f02c2ecc3bb6d45

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Documents_2014081229.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Windows\SYSTEM32\rundll32.exe
      rundll32 ..\sfdgsd.dss,DllRegisterServer
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:3728
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32 ..\sfdgsd.dss,DllRegisterServer
        3⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:848
        • C:\Windows\SysWOW64\msiexec.exe
          msiexec.exe
          4⤵
          • Blocklisted process makes network request
          • Suspicious use of AdjustPrivilegeToken
          PID:1172

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\sfdgsd.dss
    MD5

    c6b02277b3dd7e0fd1133cf9290cdef6

    SHA1

    754cc1546ceafe9f62db188e214d5696aed609d5

    SHA256

    d20f5e6ff3b8af7d2adb395d2fc57b5c35343fc7b17865ccbbc66b66711a3b4c

    SHA512

    e5702c48ce1dcdde8c059502f4c316ec31dd02ff0995ce33ebadbca913d31d0e213089c162e8cdbe356f7ca806e00ffe5f00f4ccc7ed97b6a09966fad392a701

  • \Users\Admin\sfdgsd.dss
    MD5

    c6b02277b3dd7e0fd1133cf9290cdef6

    SHA1

    754cc1546ceafe9f62db188e214d5696aed609d5

    SHA256

    d20f5e6ff3b8af7d2adb395d2fc57b5c35343fc7b17865ccbbc66b66711a3b4c

    SHA512

    e5702c48ce1dcdde8c059502f4c316ec31dd02ff0995ce33ebadbca913d31d0e213089c162e8cdbe356f7ca806e00ffe5f00f4ccc7ed97b6a09966fad392a701

  • memory/848-11-0x0000000073650000-0x0000000073679000-memory.dmp
    Filesize

    164KB

  • memory/848-9-0x0000000000000000-mapping.dmp
  • memory/848-12-0x00000000009E0000-0x00000000009E1000-memory.dmp
    Filesize

    4KB

  • memory/1108-5-0x00007FFC483F0000-0x00007FFC48A27000-memory.dmp
    Filesize

    6.2MB

  • memory/1108-6-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
    Filesize

    64KB

  • memory/1108-4-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
    Filesize

    64KB

  • memory/1108-3-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
    Filesize

    64KB

  • memory/1108-2-0x00007FFC22770000-0x00007FFC22780000-memory.dmp
    Filesize

    64KB

  • memory/1172-13-0x0000000000000000-mapping.dmp
  • memory/1172-14-0x0000000002160000-0x0000000002189000-memory.dmp
    Filesize

    164KB

  • memory/3728-7-0x0000000000000000-mapping.dmp