Analysis

  • max time kernel
    151s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    19-04-2022 12:54

General

  • Target

    Payment_Invoice.xls

  • Size

    473KB

  • MD5

    bb2e7e44ba95cb90cbb138fcbadaac3d

  • SHA1

    450f9c1101e66affdd6f28e0f8a369f1b6d86f9b

  • SHA256

    5e7ddcc8aa2977cceac204ed424e05270874e2b0da94eb5b056e968126fc9902

  • SHA512

    b087b074198e50f87d570ad8f8a45fbe2237a7088e8f96e8dad02db4a9f1e9a5997ace053b1777a529dcde6e28de2868af83ac11cbfd866fb4d7d6ce28ea8b25

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 2 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
    "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\Payment_Invoice.xls"
    1⤵
    • Checks processor information in registry
    • Enumerates system info in registry
    • Modifies registry class
    • NTFS ADS
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:460
    • C:\Users\Admin\AppData\Local\AsyncClient.exe
      "C:\Users\Admin\AppData\Local\AsyncClient.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:752
      • C:\Windows\SysWOW64\timeout.exe
        timeout
        3⤵
        • Delays execution with timeout.exe
        PID:4124

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\AsyncClient.exe
    Filesize

    382KB

    MD5

    120e11300c537b3f627f58294e9dec48

    SHA1

    b51e6df331358cb1ea81833049e3b736763760b4

    SHA256

    c8337902f1e43092f1abeff4e20d1543cb581566c70f31165b88974b90cda8f6

    SHA512

    143d034d79d348a9099a0504c3c92c18a4fd7ce1622de51ee55e28bc51ab1785a69450cce7defc90acc620125d07ed85a4372edc09ae7dc41ad940900e74fc88

  • C:\Users\Admin\AppData\Local\AsyncClient.exe
    Filesize

    382KB

    MD5

    120e11300c537b3f627f58294e9dec48

    SHA1

    b51e6df331358cb1ea81833049e3b736763760b4

    SHA256

    c8337902f1e43092f1abeff4e20d1543cb581566c70f31165b88974b90cda8f6

    SHA512

    143d034d79d348a9099a0504c3c92c18a4fd7ce1622de51ee55e28bc51ab1785a69450cce7defc90acc620125d07ed85a4372edc09ae7dc41ad940900e74fc88

  • memory/460-133-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmp
    Filesize

    64KB

  • memory/460-130-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmp
    Filesize

    64KB

  • memory/460-134-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmp
    Filesize

    64KB

  • memory/460-135-0x00007FFB31F80000-0x00007FFB31F90000-memory.dmp
    Filesize

    64KB

  • memory/460-136-0x00007FFB31F80000-0x00007FFB31F90000-memory.dmp
    Filesize

    64KB

  • memory/460-132-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmp
    Filesize

    64KB

  • memory/460-131-0x00007FFB345B0000-0x00007FFB345C0000-memory.dmp
    Filesize

    64KB

  • memory/752-137-0x0000000000000000-mapping.dmp
  • memory/752-140-0x0000000000460000-0x00000000004C6000-memory.dmp
    Filesize

    408KB

  • memory/752-141-0x0000000004EA0000-0x0000000004F3C000-memory.dmp
    Filesize

    624KB

  • memory/752-142-0x00000000054F0000-0x0000000005A94000-memory.dmp
    Filesize

    5.6MB

  • memory/4124-143-0x0000000000000000-mapping.dmp