Analysis

  • max time kernel
    71s
  • max time network
    51s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    24-05-2022 14:46

General

  • Target

    b4c23551e862b3b21b35f3984ea88d278f9ec4b78fe88460f5f63fa64beb83ae.exe

  • Size

    604KB

  • MD5

    73f00dce07e433dded8d9ad2fdfaaec0

  • SHA1

    2a444b5d2a61d3b322a631405fb9968df8f15a9b

  • SHA256

    b4c23551e862b3b21b35f3984ea88d278f9ec4b78fe88460f5f63fa64beb83ae

  • SHA512

    5d10eccf00094af9ed26707669d9511202b56d240bb8c3e9a12fc08b02da77caaca9a95be9a703ebee0ffbd6b87b83d155c812cef051bd81a06e7b65dfe88851

Malware Config

Signatures

  • Office macro that triggers on suspicious action 1 IoCs

    Office document macro which triggers in special circumstances - often malicious.

  • Loads dropped DLL 1 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4c23551e862b3b21b35f3984ea88d278f9ec4b78fe88460f5f63fa64beb83ae.exe
    "C:\Users\Admin\AppData\Local\Temp\b4c23551e862b3b21b35f3984ea88d278f9ec4b78fe88460f5f63fa64beb83ae.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2004
  • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
    "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
    1⤵
    • Loads dropped DLL
    • Writes to the Master Boot Record (MBR)
    • Enumerates system info in registry
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: AddClipboardFormatListener
    • Suspicious use of SetWindowsHookEx
    PID:2000

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Bootkit

1
T1067

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\b4c23551e862b3b21b35f3984ea88d278f9ec4b78fe88460f5f63fa64beb83ae
    Filesize

    169KB

    MD5

    08ffecb238efaa9e593128b94007ffac

    SHA1

    a1bba492cf669832d91e42c98345199916d4a2f8

    SHA256

    70c475486b7e38ba1ffcfc0c273a99dbdcf5fb80ce4566214f2775ce65ef8997

    SHA512

    7a3d90edb165ca6dd7cfe605110ec8fbdec09b6798593278adc8979355e93deb26b1b9ee44de400259c2a8a4daf7cd1e30ddc8b9bf6d06543a51ed13dc8e8029

  • C:\Users\Admin\AppData\Local\Temp\fqwfmmwj2l.dll
    Filesize

    712KB

    MD5

    e8ed63bfb33562af6d9bb62dbaaef5b9

    SHA1

    5dd2b08c4bb43814449d5d0ea9993d4e673a22bf

    SHA256

    aaa9b276ef7b9717ce93f2bdc4f2cafb5b66654d543e5783b6f4d226182ca1a5

    SHA512

    9f8581b67c469d6b6e13ac32277c9f7ffd1b64a3c18c578001058e99cc480361cde8a8ef2b28c96c1e9541be629945f5cc39c5aa051206133ce919aabacabf09

  • \Users\Admin\AppData\Local\Temp\fqwfmmwj2l.dll
    Filesize

    712KB

    MD5

    e8ed63bfb33562af6d9bb62dbaaef5b9

    SHA1

    5dd2b08c4bb43814449d5d0ea9993d4e673a22bf

    SHA256

    aaa9b276ef7b9717ce93f2bdc4f2cafb5b66654d543e5783b6f4d226182ca1a5

    SHA512

    9f8581b67c469d6b6e13ac32277c9f7ffd1b64a3c18c578001058e99cc480361cde8a8ef2b28c96c1e9541be629945f5cc39c5aa051206133ce919aabacabf09

  • memory/2000-55-0x000000002F601000-0x000000002F604000-memory.dmp
    Filesize

    12KB

  • memory/2000-56-0x0000000071311000-0x0000000071313000-memory.dmp
    Filesize

    8KB

  • memory/2000-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
    Filesize

    64KB

  • memory/2000-58-0x00000000722FD000-0x0000000072308000-memory.dmp
    Filesize

    44KB

  • memory/2000-62-0x0000000003000000-0x0000000003004000-memory.dmp
    Filesize

    16KB

  • memory/2000-65-0x0000000000337000-0x000000000033B000-memory.dmp
    Filesize

    16KB

  • memory/2004-54-0x0000000075521000-0x0000000075523000-memory.dmp
    Filesize

    8KB