General

  • Target

    REQ PO_0092546 FOR PI.doc

  • Size

    422KB

  • Sample

    211015-hh3kssafc3

  • MD5

    115cb391afa5ed68f040ec69b00c84c1

  • SHA1

    319cea32abbb8ef0a55fff174dafdea4d3a7b0c7

  • SHA256

    2716bdd86f5e2a5364c1dd061a36270bf8eade4838e0e0e08677093bc0b8d910

  • SHA512

    077c977bd8e08579e9f2f85b7077dbe869b1ac0359d40d463b0a7dda28b0a297222e44386b62fff4b04367513286e8fe755352cca59d1c2ce78e306b310e7879

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

httP://avira.ydns.eu/EXCEL.exe

Targets

    • Target

      REQ PO_0092546 FOR PI.doc

    • Size

      422KB

    • MD5

      115cb391afa5ed68f040ec69b00c84c1

    • SHA1

      319cea32abbb8ef0a55fff174dafdea4d3a7b0c7

    • SHA256

      2716bdd86f5e2a5364c1dd061a36270bf8eade4838e0e0e08677093bc0b8d910

    • SHA512

      077c977bd8e08579e9f2f85b7077dbe869b1ac0359d40d463b0a7dda28b0a297222e44386b62fff4b04367513286e8fe755352cca59d1c2ce78e306b310e7879

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • UAC bypass

    • Windows security bypass

    • XpertRAT

      XpertRAT is a remote access trojan with various capabilities.

    • Adds policy Run key to start application

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Windows security modification

    • Accesses Microsoft Outlook accounts

    • Adds Run key to start application

    • Checks whether UAC is enabled

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

2
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

3
T1089

Modify Registry

7
T1112

Discovery

System Information Discovery

3
T1082

Query Registry

2
T1012

Collection

Email Collection

1
T1114

Tasks