Analysis

  • max time kernel
    148s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    28-07-2021 02:26

General

  • Target

    Invoice_015275.xlsm

  • Size

    89KB

  • MD5

    998a996a2371923b05250adc50f2c88c

  • SHA1

    5dcff5955a7d6f0d5cb09074663feda9e8b6fe83

  • SHA256

    c9843b6e4015374ff8049d9f0fed174a1aa690d7da3cb459922eae885006184a

  • SHA512

    c627d06392672cb56f0e06f98f00f4918897b083a765da36f6869d466a6eedead1ffcc328965955346667768fdab6aeb8cf166539daf3036a53c5e6c75275259

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 10 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\Invoice_015275.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1676
    • C:\Windows\SysWOW64\mshta.exe
      mshta C:\ProgramData//theDialogOptionsCalculation.sct
      2⤵
      • Process spawned unexpected child process
      • Modifies Internet Explorer settings
      • Suspicious use of WriteProcessMemory
      PID:1284
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\ProgramData\qScrollBar.dll,AddLookaside
        3⤵
          PID:552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\ProgramData\theDialogOptionsCalculation.sct
      MD5

      8206451e9ae57b8d68dfaa221be4ac68

      SHA1

      6518d1f303dffc52a9f940b211b7300eb33f0178

      SHA256

      f03e8b823b0ee4420a82ee7e9594cddc3ffb38f04685846498a57808ab167d78

      SHA512

      722e105e5545de54b3db97f9421933674bd20fbadde220fde126e046d0a571ed0db1fbb084cb5f790d9a889dcdfcfbab275bf5be6a5070a95eec935b2900915a

    • memory/552-65-0x0000000000000000-mapping.dmp
    • memory/1284-62-0x0000000000000000-mapping.dmp
    • memory/1284-63-0x00000000767B1000-0x00000000767B3000-memory.dmp
      Filesize

      8KB

    • memory/1676-59-0x000000002FC01000-0x000000002FC04000-memory.dmp
      Filesize

      12KB

    • memory/1676-60-0x0000000071B01000-0x0000000071B03000-memory.dmp
      Filesize

      8KB

    • memory/1676-61-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB