Analysis

  • max time kernel
    124s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    14-07-2021 20:01

General

  • Target

    2c09d3a56963998d19833b6edbdfbc3e58b62a58ca361e0275b81de740d6afdd.xlsm

  • Size

    87KB

  • MD5

    5862ac9976cba84fe24e72dd6380d330

  • SHA1

    a1605db9c23eeb3f49958447023d9ff85df14b34

  • SHA256

    2c09d3a56963998d19833b6edbdfbc3e58b62a58ca361e0275b81de740d6afdd

  • SHA512

    4e1d2bfbb72c4351046e739155297368600430cb1e891822063983b1aa98b5d4396bbc7673623b71dbbadb1dfbe279864c5cc4e3a4afb06d1d709b1b2493d8f0

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://carpascapital.com/gBPg8MtsGbv/ka.html

xlm40.dropper

https://gruasphenbogota.com/C74hwGGxi/ka.html

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 9 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\2c09d3a56963998d19833b6edbdfbc3e58b62a58ca361e0275b81de740d6afdd.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:1100
  • C:\Windows\system32\verclsid.exe
    "C:\Windows\system32\verclsid.exe" /S /C {0B2C9183-C9FA-4C53-AE21-C900B0C39965} /I {0C733A8A-2A1C-11CE-ADE5-00AA0044773D} /X 0x401
    1⤵
      PID:824
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde
      1⤵
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 ..\gihi1.dll
        2⤵
        • Process spawned unexpected child process
        PID:848
      • C:\Windows\SysWOW64\regsvr32.exe
        regsvr32 ..\gihi2.dll
        2⤵
        • Process spawned unexpected child process
        PID:108

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/108-72-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/108-69-0x0000000000000000-mapping.dmp
    • memory/632-65-0x0000000072941000-0x0000000072943000-memory.dmp
      Filesize

      8KB

    • memory/632-66-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/632-64-0x000000002FED1000-0x000000002FED4000-memory.dmp
      Filesize

      12KB

    • memory/824-63-0x000007FEFBDA1000-0x000007FEFBDA3000-memory.dmp
      Filesize

      8KB

    • memory/848-68-0x00000000757D1000-0x00000000757D3000-memory.dmp
      Filesize

      8KB

    • memory/848-67-0x0000000000000000-mapping.dmp
    • memory/848-71-0x00000000001B0000-0x00000000001B1000-memory.dmp
      Filesize

      4KB

    • memory/1100-62-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1100-59-0x000000002FCE1000-0x000000002FCE4000-memory.dmp
      Filesize

      12KB

    • memory/1100-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/1100-60-0x00000000715A1000-0x00000000715A3000-memory.dmp
      Filesize

      8KB