Analysis
-
max time kernel
163s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b.xlsm
Resource
win7-20220311-en
General
-
Target
3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b.xlsm
-
Size
1.6MB
-
MD5
5fab2a427175d69f010acfd2caff68b0
-
SHA1
69657f55e9fdc505a3681c4e5df680aecb89a780
-
SHA256
3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b
-
SHA512
1cf9b4ee4fb60906198e18a182bce4622bd6c5bef8ef32bedb38442c75c7966cc5ba705730dc3f3cc07dfb4cf60f9b7e70daa3c6975cca8cd405f4ac84e666ad
Malware Config
Signatures
-
PlugX Rat Payload 1 IoCs
resource yara_rule behavioral2/memory/1528-145-0x000002B301200000-0x000002B301F90000-memory.dmp PlugX -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3136 1528 powershell.exe 78 -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 2728 1528 DW20.EXE 78 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{0D839A2D-119C-4BEA-9D09-B053CABD0084}\SPD.exe:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1528 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1528 EXCEL.EXE 3136 powershell.exe 3136 powershell.exe 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1528 EXCEL.EXE Token: SeDebugPrivilege 3136 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1528 EXCEL.EXE 1528 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE 1528 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1528 wrote to memory of 4824 1528 EXCEL.EXE 86 PID 1528 wrote to memory of 4824 1528 EXCEL.EXE 86 PID 1528 wrote to memory of 3136 1528 EXCEL.EXE 91 PID 1528 wrote to memory of 3136 1528 EXCEL.EXE 91 PID 1528 wrote to memory of 2728 1528 EXCEL.EXE 93 PID 1528 wrote to memory of 2728 1528 EXCEL.EXE 93 PID 2728 wrote to memory of 3412 2728 DW20.EXE 94 PID 2728 wrote to memory of 3412 2728 DW20.EXE 94
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\3bca1997648eb70fd53abcfd9f5b1880b58daea9aa4c8b434790ebb81ace182b.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:4824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "& ($env:TEMP + \"\SPD.exe\") \"[email protected]\" \"Nhh2H5urwHv0\" \"https://finansco.sharepoint.com/Delte dokumenter/Finansco Gruppen Fellesmappe/Modellporteføljer/\" \"Produktark MPF Kopi.xlsx\""2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3136
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 71522⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 71523⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:3412
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:1504